Crypto and Blockchain Security Book

Crypto & Blockchain Security

The book will be published soon. In the meantime, you can download for free the training material this book is based on. See Blockchain and Crypto Security Training.

Free book chapters

Cryptosec Maps Dark Web SIM Swapping Economy

In the U.S. alone, SIM-swapping attacks resulted in $72 million worth of losses last year, four-million dollars more than 2021, according to the Federal...

Verified Crypto Account Listings Proliferate on the Dark Web

Verified crypto-exchange accounts have become a hot commodity on the dark web, with login credentials available for as little as $20, according to May...

A Deep Dive Into the ‘Rags to Riches’ Manual for Withdrawing...

Annualized data from blockchain forensics provider Chainalysis indicates that crypto-enabled crime has dropped precipitously through the first half of 2023, but cybercriminals are also...

How Blockchain Security Differs From Traditional Cybersecurity – 4 – Security...

This article concludes our four-part series on the basic differences between traditional IT security and blockchain security. Previous articles discussed the security differences critical...

How Blockchain Security Differs From Traditional Cybersecurity – 3 – User...

This article is the third in a four-part series exploring the differences between traditional IT security and blockchain security.  Check out the first two...

How Blockchain Security Differs From Traditional Cybersecurity – 2 – Smart...

This article is the second in a four-part series discussing the differences between traditional IT security / cybersecurity and blockchain security.  Check out the...

Proof of Reserve vs. Proof of Liability vs. Proof of Solvency

Recent events like the FTX meltdown have sparked interest and conversations about how the incident could have been prevented.  In the case of FTX,...

How Blockchain Security Differs From Traditional Cybersecurity – 1 – Node...

Blockchain is a rapidly-evolving technology with a great deal of interest and investment. Decentralized Finance (DeFi), in particular, has a great deal of money...

The 12 Biggest Hacking Incidents in the History of Crypto

The most comprehensive ranked list of the biggest crypto hacks in history (Up until November 1, 2022. I suspect a larger one is just...

How the Big Binance Bridge Hack Will Change the way People...

$566M worth of BNB was stolen from Binance’s cross-chain bridge BSC Token Hub, but how they responded to the hack will be the most...

How a $1B Flash Loan Led to the $182M Beanstalk Farms...

Understanding how flash loans and governance work in DeFi to demystify the Beanstalk Farms Hack The only way to understand how the Beanstalk Farms decentralized...

The Top 4 Supply Chain Security Risks of Blockchain Smart Contracts

Code reuse is considered best practice in software engineering.  Reusing high-quality, secure code can speed development processes and often results in higher-quality code than...

How the Nomad Bridge Hack can Help Us Explore the Potential...

One attacker and hundreds of copycats looted the Nomad bridge for over $190 million; few did the right thing. Decentralization is a hot-button topic in...

Introduction to Zero-Knowledge Proofs

Proving knowledge of a secret is the basis of password-based authentication systems.  The assumption is that only you know your password.  If this is...

How Crypto’s Biggest Hacker was Found but Never Identified

The $611M Poly Network exploit is the largest crypto hack to date in terms of mark-to-market value and all the stolen funds were returned,...

The $160M Wintermute Hack: Inside Job or Profanity Bug?

Getting to the bottom of the exploit that led to one of the biggest hacks in the history of decentralized finance.  In order to understand...

Introduction to Blockchain Layers 0, 1, and 2 Security

What Are Blockchains Layers 0, 1, and 2? A blockchain is a complex, multi-layered system.  Bitcoin, the original blockchain, maintained a distributed and decentralized digital...

Trying to Solve the Mysterious $200M BitMart Hack

A missing pile of Safemoon and other cryptocurrencies, accusations of broken promises, and then nothing. When a high-profile cyber attack takes place and hundreds of...

Why DevSecOps is Essential for the Blockchain Ecosystem

In recent years, many organizations have adopted more modern development practices, including Agile, Scrum, and DevOps.  The goal of these new processes is to...

What the $534M Coincheck Hack Taught Us All About Safe Storage...

The biggest crypto heist in history at the time it occurred in 2018 was an eye-opener for many reasons, not least of which for...