The official blog of the Hacken Ecosystem and HKN Community

How white hats protect businesses against cyber crimes.

Decentralized vs Centralized Exchanges: Advantages and Disadvantages

  Nowadays, cryptocurrencies such as Bitcoin (BTC), Ethereum (ETH), Dash, Monero (XMR), Ripple (XRP), Litecoin (LTC) and others have become a global phenomenon known to most people. As of May 15, 2018, data site CryptoCoinCharts indexed 4,625 cryptocurrencies with a total 24h volume of $15.12 Billion and $405.63 Billion market capitalization! Among all the cryptocurrencies, BTC share in ...

Read More

Freaking out about the issues of car sharing? Consider the power of transparency

Hacken forms a security partnership with HireGo If you have ever done car sharing, you might know what to expect. The gas tank always seems to be empty, the renter can be messy, or the owner exaggerates the battery capacity, not to mention insurance question. Recent years have seen a remarkable surge in car sharing. Despite the popularity of the service, some issues remain to be worked o...

Read More

Ambit — sheer heaven for mining enthusiasts

Hacken partners with Ambit to ensure its smart contracts security and anti-phishing protection of the ICO Imagine lush green valleys spread with vineyards, old churches, and watchtowers with fantastic Caucasus Mountains views. Isn’t it great to at least imagine that hardware for mining cryptocurrency is located in such marvelous scenery that can be found in Georgia? FYI: Georgia has an a...

Read More

HackenProof is here!

A decentralized bug bounty platform of white hat hackers is officially launched Some of you have already found out, but today it’s official — we are excited to announce the launch of an alpha version of HackenProof! With such a rapidly growing threat from cybercriminals, the Hacken Team aims to be even more challenging to be up to date with cybersecurity demands. That’s why we have launc...

Read More

Enjoy White Hats' quality of service!


We offer Cybersecurity Services that enable Cybercrime prevention for Businesses which lack the scale, expertise, or time to do it themselves.
Follow the experience of ICOs and companies that are cyber-protected now!

Contact us