The official blog of the Hacken Ecosystem and HKN Community

How white hats protect businesses against cyber crimes.

Types of Cryptocurrency Wallets and Their Overall Security Aspect

  Types of Cryptocurrency Wallets and Their Overall Security Aspect A cryptocurrency wallet is a software application that stores private and public keys, giving a user access to their crypto funds on the blockchain. To put it simply, if you want to trade Bitcoin or any other cryptocurrencies, a digital wallet is a prerequisite to begin. A common misconception about cryptocurrency wallet...

Read More

What You Need to Know About CER: Crypto Exchange Ranks Launch

  The cryptocurrency arena is growing to massive highs in both the number of tokens, crypto exchanges, and market size; specific factors come into play on how to trade safely and wisely. Accurate analytics is the goal for any crypto trader regardless of the amount of investments. Crypto Exchange Ranks (CER) is the project aiming to provide comprehensive sustainability and vulnerability a...

Read More

Crypto Exchange Penetration Testing As It is

 A short story of why we need exchanges Imagine you find yourself on a deserted island with a huge bag of gold and dollars (and even a few Bitcoins). You are rich — you can purchase anything you want. However, you’ll never use your money: there is no one to trade with. Your money is useless because you cannot exchange it on goods. That is why exchanges came around.  They connect buyers a...

Read More

VeChainThor Public Bug Bounty on HackenProof

With the beginning of VeChainThor Alpha Test at the end of this May, VeChain Foundation has started a Private Bug Bounty Program on HackenProof platform to test their product for security vulnerabilities (here is a link to our press release with more information). We are happy to share the news that VeChain Foundation has decided to upgrade to a Public Bug Bounty program and that it has ...

Read More

Enjoy White Hats' quality of service!

We offer Cybersecurity Services that enable Cybercrime prevention for Businesses which lack the scale, expertise, or time to do it themselves.
Follow the experience of ICOs and companies that are cyber-protected now!

Contact us