Microsoft joined Cornell Blockchain Research Group

Technology giant has joined the Cornell Tech-based Initiative for Cryptocurrencies and Contracts (IC3)
03 September 2017   806

The partnership has a goal to transform tomorrow’s financial systems to be much more flexible, transparent, efficient and secure. This is reported by News Wise

As we continue our journey in blockchain, we have watched and read the work of the IC3 team and are impressed with their thinking and the perspective they bring to the community.  We are very aligned with the approaches IC3 blockchain experts are taking to address scale, simplification, and other topics of interest for enterprise adoption. The synergies in their research fit well with our visions for enterprise scale blockchain solutions. We are excited to work more closely with IC3 through this membership.
 

Yorke E. Rhodes III
Global Blockchain Business Strategist, Microsoft.

What is IC3?

IC3 is an initiative of Cornell University, Cornell Tech, UC Berkeley, University of Illinois at Urbana-Champaign, and the Technion. IC3 provides world-class expertise in computer science that spans cryptography, distributed systems, game theory, programming languages, and system security techniques. IC3’s innovations include blockchain, smart contract, and cryptocurrency technologies that offer both the scientifically rigorous security properties and the robustness, performance, and reliability demanded by practitioners for tomorrow’s financial systems of execution and record.

Chinese Miners to Fall Victims of Ransomware

Looks like ransomware came together with "improved" firmware, that should "overclock" device
21 January 2019   79

In China, a ransomware spreads, victims of which are Bitcoin miners. The damage from its activities is measured in tens of thousands of dollars. This is reported by Trustnodes.

The virus infects miners, released by Bitmain, and requires you to send 10 bitcoins, otherwise threatening to cause overheating of the device.

The problem is solved by formatting the SD card of the infected device, however, as Trustnodes notes, the whole process can take up to four days, while malicious software rapidly spreads to the other miners.

Compromised device
Compromised device

Probably, the virus comes with an "improved" firmware for miners. Some owners install such firmware to “overclock” their ASIC devices and improve their performance.

The first messages about the virus refer to August last year. In particular, Antminer S9, T9 and even L3 + for Litecoin were attacked. Over time, the malware has been improved. Now its distributor himself can decide when to display a message requesting a ransom. One miner also said that one night the address to which the 4,000 devices belonging to him sent the mined cryptocurrency was changed to the address of the hacker, which brought him $ 8,000.