SYS-CON MEDIA Authors: Zakia Bouachraoui, Elizabeth White, Pat Romanski, Liz McMillan, Yeshim Deniz

News Feed Item

360 Rolls Out "360 Virtual Vault" - the Blockchain Wallet Protector

BEIJING, May 31, 2018 /PRNewswire/ -- On May 29th, 360 Total Security reported a series of vulnerabilities on EOS blockchain platform. It has been proved that some vulnerabilities allow arbitrary code execution, which means attackers can exploit all the nodes running on EOS to fully manipulate transaction.

Recently, 360 rolled out a security product for keeping private key safe - 360 Virtual Vault. It offers a secure solution for users to store private key on PC. It uses an extra strong encryption algorithm to store and backup private keys for blockchain wallet files of most cryptocurrencies like Bitcoin(BTC), Ethereum(ETH), Litecoin(LTC)(LTC), Monero (XMR).

Now 360 Virtual Vault is online and free for download:
https://www.360totalsecurity.com/tools/virtual-vault/

Any security hole can be vital while Blockchain currencies become accessible to everyone

Blockchain has been praised as being the most innovative technological development since the Internet itself. Its evolutionary and decentralized design makes the transaction storing on it more reliable and immutable. Though the blockchain architecture is designed to be accountable, the user's private key is the most insecure breach in the whole system. Lots of users take huge risks by saving their private keys in blockchain exchange. In case of EOS vulnerability, the data, such as cryptocurrencies, private key and personal data, stored on the blockchain are transparent to attackers once the system is compromised. In the world of blockchain, losing private key means losing everything. Giving away private key allows others to withdraw all your digital money.

1) 2014/2/14, The bitcoin exchange, Mt.Gox, announced that 850 thousands bitcoins on it were stolen, and it later went offline and claimed bankruptcy.

2) 2016/8/3, Bitfinex reports that due to the vulnerability on its website, the users' bitcoins it kept were stolen. There were 119756 bitcoins stolen. It's about 65 million US dollar in valuation.

Keeping the private key safe is critical

Keeping private key safe is always a hot topic when talking about blockchain security. Some people choose to keep their private key with themselves or save it in the exchange. Since the exchange is usually the biggest target for attackers, and its system may contain vulnerabilities, most users choose to keep it with themselves. For example, saving it with cold wallet or portable storage, writing it down on paper. But the risks of losing it remain.

360 Virtual Vault reduces the risk of losing everything because of stolen private key. The built-in 2 way authentication and encryption makes it almost impossible for stealers to crack. Users can specify the wallet files they would like to protect. The wallet file will be safely stored on the PC without worrying it being physically or virtually stolen.

Cision View original content:http://www.prnewswire.com/news-releases/360-rolls-out-360-virtual-vault---the-blockchain-wallet-protector-300657282.html

SOURCE 360

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Docker is sweeping across startups and enterprises alike, changing the way we build and ship applications. It's the most prominent and widely known software container platform, and it's particularly useful for eliminating common challenges when collaborating on code (like the "it works on my machine" phenomenon that most devs know all too well). With Docker, you can run and manage apps side-by-side - in isolated containers - resulting in better compute density. It's something that many developer...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get tailored market studies; and more.
While a hybrid cloud can ease that transition, designing and deploy that hybrid cloud still offers challenges for organizations concerned about lack of available cloud skillsets within their organization. Managed service providers offer a unique opportunity to fill those gaps and get organizations of all sizes on a hybrid cloud that meets their comfort level, while delivering enhanced benefits for cost, efficiency, agility, mobility, and elasticity.
Kubernetes as a Container Platform is becoming a de facto for every enterprise. In my interactions with enterprises adopting container platform, I come across common questions: - How does application security work on this platform? What all do I need to secure? - How do I implement security in pipelines? - What about vulnerabilities discovered at a later point in time? - What are newer technologies like Istio Service Mesh bring to table?In this session, I will be addressing these commonly asked ...
The KCSP program is a pre-qualified tier of vetted service providers that offer Kubernetes support, consulting, professional services and training for organizations embarking on their Kubernetes journey. The KCSP program ensures that enterprises get the support they're looking for to roll out new applications more quickly and more efficiently than before, while feeling secure that there's a trusted and vetted partner that's available to support their production and operational needs.
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, discussed why containers should be paired with new architectural practices such as microservices rathe...
In a recent survey, Sumo Logic surveyed 1,500 customers who employ cloud services such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). According to the survey, a quarter of the respondents have already deployed Docker containers and nearly as many (23 percent) are employing the AWS Lambda serverless computing framework. It's clear: serverless is here to stay. The adoption does come with some needed changes, within both application development and operations. Th...
When you're operating multiple services in production, building out forensics tools such as monitoring and observability becomes essential. Unfortunately, it is a real challenge balancing priorities between building new features and tools to help pinpoint root causes. Linkerd provides many of the tools you need to tame the chaos of operating microservices in a cloud native world. Because Linkerd is a transparent proxy that runs alongside your application, there are no code changes required. I...
xMatters helps enterprises prevent, manage and resolve IT incidents. xMatters industry-leading Service Availability platform prevents IT issues from becoming big business problems. Large enterprises, small workgroups, and innovative DevOps teams rely on its proactive issue resolution service to maintain operational visibility and control in today's highly-fragmented IT environment. xMatters provides toolchain integrations to hundreds of IT management, security and DevOps tools. xMatters is the ...
With the rise of Docker, Kubernetes, and other container technologies, the growth of microservices has skyrocketed among dev teams looking to innovate on a faster release cycle. This has enabled teams to finally realize their DevOps goals to ship and iterate quickly in a continuous delivery model. Why containers are growing in popularity is no surprise — they’re extremely easy to spin up or down, but come with an unforeseen issue. However, without the right foresight, DevOps and IT teams may lo...
DevOps is under attack because developers don’t want to mess with infrastructure. They will happily own their code into production, but want to use platforms instead of raw automation. That’s changing the landscape that we understand as DevOps with both architecture concepts (CloudNative) and process redefinition (SRE). Rob Hirschfeld’s recent work in Kubernetes operations has led to the conclusion that containers and related platforms have changed the way we should be thinking about DevOps and...
Kubernetes is an open source system for automating deployment, scaling, and management of containerized applications. Kubernetes was originally built by Google, leveraging years of experience with managing container workloads, and is now a Cloud Native Compute Foundation (CNCF) project. Kubernetes has been widely adopted by the community, supported on all major public and private cloud providers, and is gaining rapid adoption in enterprises. However, Kubernetes may seem intimidating and complex ...
Between the mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at @DevOpsSummit at 19th Cloud Expo, Charles Kendrick, CTO at Isomorphic Software, presented a revolutionary model enabled by new technologies. Learn how business and develop...