{"id":10965,"date":"2017-06-02T08:07:09","date_gmt":"2017-06-02T08:07:09","guid":{"rendered":"https:\/\/passkit.com\/blog\/?p=10965"},"modified":"2017-06-02T08:07:09","modified_gmt":"2017-06-02T08:07:09","slug":"how-does-blockchain-prevent-cyberattacks","status":"publish","type":"post","link":"https:\/\/passkit.com\/blog\/how-does-blockchain-prevent-cyberattacks\/","title":{"rendered":"How Does Blockchain Prevent Cyberattacks?"},"content":{"rendered":"<p class=\"v2-processed\">We live today in an increasingly connected ecosystem, pretty much everything is connected to the internet. The problem is that any connected device is potentially vulnerable to attacks from hackers. Yet, the public remain unaware of such threats while the danger is real. For instance, \u00a0Since friday 12th of May 2017 the global virus of the \u201cWannaCry&#8221; ransomware has affected 30,000 companies just in China and more than 100,000 companies all around the world, including public institutions such as\u00a0Britain\u2019s National Health Service and Spanish telecoms giant Telefonica. From hacking and controlling your connected car to hacking bank&#8217;s data, hacker&#8217;s could be the number one source of major financial and personal data losses.<\/p>\n<h3 class=\"v2-processed\"><\/h3>\n<h3 class=\"v2-processed\"><\/h3>\n<h3 class=\"v2-processed\">How do &#8220;WannaCry&#8221; hackers proceed?<\/h3>\n<p class=\"v2-processed\">This strain of ransomware was spread from device to device by taking advantage of an old security hole in some versions of Microsoft&#8217;s Windows operating system. It infects the computer systems, encrypts the\u00a0data and requires a\u00a0payment to restore access.<\/p>\n<p class=\"alpha tweet-title\">The hackers can also spread the virus\u00a0by\u00a0installing software on the user\u2019s computer though pirate software method (for instance, creating a clone of the real &#8220;Popcorn Time&#8221; website and using SEO to appear above the real one on Google, then make people click on the clone to install viruses that can access all parts of their system) .<\/p>\n<p class=\"alpha tweet-title\"><span lang=\"en\">The authors of the global cyber attack launched Friday demand the payment of the ransoms in bitcoins because this crypto currency allows anonymity. But instead of satisfying the cybercriminal&#8217;s wishes, the\u00a0<\/span><a href=\"https:\/\/passkit.com\/blog\/10-ways-blockchain-technology-can-be-used-in-businesses\/\">Blockchain Technology<\/a>\u00a0could destroy them and here&#8217;s how.<\/p>\n<h3 class=\"alpha tweet-title\"><\/h3>\n<h3 class=\"alpha tweet-title\"><\/h3>\n<h3 class=\"alpha tweet-title\">How blockchain can help fight cyberattacks?<\/h3>\n<p>For the companies that use Blockchain Technology, security offered by the system is one of the most crucial aspects, and given all that&#8217;s been happening since friday, we now know why.<\/p>\n<h4>Ensuring security of any information<\/h4>\n<p>Because most implementations of Public Key Infrastructure (PKI) rely on &#8220;centralized&#8221;, trusted third party Certificate Authorities (CA) to issue and store key pairs for every participant, hackers can compromise them to steal user identities and crack encrypted communications. On the other hand, a Keyless Signature Infrastructure (KSI) used\u00a0in the Blockchain\u00a0&#8220;distribute&#8221; the information. It means\u00a0that\u00a0even if one node is compromised, an attacker would have to compromise over 50% of the network before the data would be permanently insecure to the point that it could not be rebuilt. Plus, because each block is tied to the previous block by means of a cryptographic hash, it is very easy to identify the data which has been manipulated. Which makes it very convenient for the organizations with high security requirements and mutually unknown actors such as banks for example.<\/p>\n<h4 class=\"v2-processed\">\u00a0Protecting critical infrastructure from Denial of Service attacks<\/h4>\n<p class=\"v2-processed\">Here&#8217;s another failure of centralized infrastructures, by bringing down the single service that provided Domain Name Services (DNS), major websites like Netflix, Paypal or Twitter can be shutted down for several hours.<\/p>\n<p class=\"v2-processed\"><em>\u201cThe killer weakness of the current DNS system is its overreliance on caching\u201d<\/em>, Says Nebulis founder Philip Saunders. The Blockchain Technology could bring a transparent and distributed DNS system where domain records will be managed by their owners and thus, will never yield under an excess of requests or manipulated by a third party.<\/p>\n<p class=\"v2-processed\"><em>\u201cBlockchain technology, used today mainly in financial transactions, can easily become an alternative way to ensure the security of any information.\u00a0The principle of the chain, constructed according to certain rules and secure encryption ensures that only one data block is processed at each stage of the transmission information.\u00a0Consequently, in the case of intruders can not control the transaction process, since not receive all the necessary information.\u00a0This principle can be extended to the entire Internet\u201d, Says the Chief Security Expert at Kaspersky Lab Alexander Gostev.<\/em><\/p>\n<h4><\/h4>\n<h4><\/h4>\n<h4>Interested in PassKit\u2019s Blockchain As A Service?<\/h4>\n<p>Get in touch with us at <a href=\"mailto:blockchain@PassKit.com\">blockchain@PassKit.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We live today in an increasingly connected ecosystem, pretty much everything is connected to the internet. The problem is that any connected device is potentially vulnerable to attacks from hackers. Yet, the public remain unaware of such threats while the danger is real. For instance, \u00a0Since friday 12th of May 2017 the global virus of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11089,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,36],"tags":[77,81,157,307],"class_list":["post-10965","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blockchain","category-security","tag-blockchain","tag-business","tag-hackers","tag-security"],"_links":{"self":[{"href":"https:\/\/passkit.com\/blog\/wp-json\/wp\/v2\/posts\/10965","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/passkit.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/passkit.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/passkit.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/passkit.com\/blog\/wp-json\/wp\/v2\/comments?post=10965"}],"version-history":[{"count":0,"href":"https:\/\/passkit.com\/blog\/wp-json\/wp\/v2\/posts\/10965\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/passkit.com\/blog\/wp-json\/wp\/v2\/media\/11089"}],"wp:attachment":[{"href":"https:\/\/passkit.com\/blog\/wp-json\/wp\/v2\/media?parent=10965"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/passkit.com\/blog\/wp-json\/wp\/v2\/categories?post=10965"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/passkit.com\/blog\/wp-json\/wp\/v2\/tags?post=10965"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}