Remove Cryptocurrency Remove Energy and Utilities Remove Identity Theft
article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

Since blockchain’s arrival, cryptocurrency has framed the technology as permissionless, or a public blockchain. Beyond financial exchange, permissionless blockchains offer strong security through decentralization, and potential use cases include identity verification, voting, and fundraising. Permissionless Blockchain. Block Armour.

article thumbnail

Spam and phishing in 2022

SecureList

These sites referenced public figures and humanitarian groups, offering to accept cash in cryptocurrency, something that should have raised a red flag in itself. The scheme likely aimed at identity theft: the illegal use of others’ personal details for deriving profit.

Phishing 117