Cryptocurrencies latest news and history organized by date that contains 1000000+ news archives. Click here to read what world was saying about cryptocurrencies. ATHENS, Greece, June 22, 2020 (GLOBE NEWSWIRE) — TEN Ltd. (the “Company” or “TEN”) (NYSE: TNP) today announced a one-for-five (1-for-5) reverse… Bitcoin and other cryptocurrencies are fueling a wave of ransomware attacks to the tune of $1.4 billion in the U.S. Hackers encrypt the victim’s data and then require the victim to pay a fee in bitcoin or certain other cryptocurrencies to obtain the decryption key needed to release the data.
- Crypto Can Change The World: Bennington
- Lebanese Pound Falls 50% in Ten Days — Now Worth One Satoshi
- Court Likens Coinbase to a ‘Traditional Bank’ in Child Porn Appeal Case
- Brazil Eases WhatsApp Ban — But It’s Still Suspended
- Ripple (XRP) Price Won’t Go Down Quietly: Risk of Bullish Breakout Grows
- IBM blockchain set to transform Norwegian seafood industry
- Bitcoin Rises on Positive US Jobs Report: Why Analyst Sees a Correction
- A ‘Significant Increase’: UK Regulator Says 2.6 Million Residents Have Bought Cryptocurrencies
- Ethereum Holds Strong at $225: A Strengthening Case for Upside
- Compound Lowers Interest Rates Amid Yield Farming Frenzy
- Fund Manager Disproves Popular Stock-to-Flow Model Projecting Bitcoin At $100K By 2021
- Big Finance Tried to Discredit Bitcoin, Here’s Why They’re Wrong
- Litecoin (LTC) Price Analysis: Bulls Facing An Uphill Task At $42.50
- Bitcoin Price Stalls At $9.2k, But Bulls Are Still Eying Gigantic Move Towards $13,000
- Russian court rejects appeal for criminals to return stolen bitcoins as it is not a legal tender.
- Public Mint Launches, Announces 200 Banks Are On Board
- Major Bitcoin wallets address double-spending attack exploit
- Analyst explains how ADA could continue its rally as Cardano’s “Shelly” arrives
- A newly-disclosed flaw found in several popular Bitcoin wallets could let attackers trick users into thinking they got paid
- Researchers Expose Flaw in Bitcoin Wallets That Could Be Exploited for Double-Spending
- ‘Boring’ Bitcoin Hits Multiple Year-to-Date Highs
- Why Bitcoin Bulls Are Betting on Explosive Growth in India
- Crypto Firm TenX Shifts Management Following Wirecard Fiasco
- Former Goldman Sachs Exec Says Bitcoin’s (BTC) $1,000,000 Upside Annihilates Traditional Investment Opportunities
- Bitcoin Fails at $9,300 as DeFi Altcoins Surge: Thursday’s Price Watch
- All Inflation? In Bitcoin Terms, Stocks Never Recovered From Covid-19
- TRON Gains for the 5th Day Straight; Spikes Above $0.0170
- Alibaba leads Blockchain patent race
- S2F Bitcoin Price Prediction Model as Accurate as Astrology, Says Exec
- Crypto Lender BlockFi Says Monthly Revenue Up 100% After Bitcoin Halving User Boost
- Market Analysis Report (02 Jul 2020)
- Public Mint Launches Blockchain with 200 Banks’ Support
- Lebanese pound continues to lose its value against the dollar as one lira is now worth a satoshi.
- Chainlink long-term Price Analysis: 02 July
- Binance confirms partnership with Swipe for debit card launch
- Khloe Kardashian & Tristan Thompson Might Be Engaged – And I Quit The Internet Today
- Researchers Discover Flaw That Could Trick Users to Believing They Have Bitcoin In Their Wallets
- Crypto exchange Binance reportedly confirms partnership with Swipe.
- Sri Lanka’s Blockchain Bank KYC Platform to Enter Development ‘Shortly’: Central Bank
- Bitcoin Price Analysis: Shwoing Some Action Above 9000 USD Where To Go?
- Almost 70% Don’t Ever See Gold Price Flipping Bitcoin Price
- Binance Partners with Swipe to Issue Its Crypto Card
- $0.0177 is the TRX Resistance Level to Watch Ahead of TRON 4.0
- Analyst Expects Bitcoin Price to Hit $27,000; Here’s Why
- Lebanese Lira collapses, is now worth one satoshi
- “Don’t even think” crypto will be immune to a derivative crisis: Bitcoin whale
- Kyber Network up 29% ahead of ETH staking rewards launch
- What Does Wirecard’s Shutdown Say About Fintech’s Systemic Weaknesses?
- Blockchain Exec Says Decentralized Platforms Won’t Necessarily Replace YouTube
- Sri Lanka Central Bank Selects Shortlist for Blockchain Proof-of-Concept
- Bitcoin to reach ‘$14,000 much faster than people expect’
- This Eerie Nasdaq Fractal Predicts Bitcoin Will Rocket to $15,000 in 2020
- Bitcoin, Stocks at Risk as Dr. Fauci Predicts 100K Daily New COVID Cases
- As Altcoins Rally, Blockstream CEO Says Bitcoin Is the Only Crypto
- OKEx, Skew Release 10 New Trading Data Charts as Partnership Evolves
TEN Ltd. Announces Reverse Stock Split to be Effective July 1, 2020 | Markets Insider
ATHENS, Greece, June 22, 2020 (GLOBE NEWSWIRE) — TEN Ltd. (the “Company” or “TEN”) (NYSE: TNP) today announced a one-for-five (1-for-5) reverse share split of the Company’s common shares. The Company’s shareholders approved the reverse share split at the Company’s annual meeting of shareholders held on May 28, 2020.
The reverse share split will take effect, and the Company’s common shares will begin trading on a split-adjusted basis on the New York Stock Exchange (“NYSE”), as of the opening of trading on or about July 1, 2020. The CUSIP number of G9108L173 will be assigned to the Company’s common shares when the reverse share split becomes effective.
When the reverse share split becomes effective, every five (5) of the Company’s common shares will be combined into one common share, with a corresponding increase in the par value per share to $5.00 per share. This will reduce the number of authorized common shares from 175 million to 35 million and the number of outstanding common shares from approximately 95 million common shares to approximately 19 million common shares.
No fractional shares will be issued in connection with the reverse share split. Shareholders who would otherwise hold a fraction of a share of a common share of the Company will receive a cash payment in lieu thereof at a price equal to that fraction of a share to which the shareholder would otherwise be entitled, multiplied by the closing price of the Company’s common shares on the NYSE on June 30, 2020 (as adjusted for the reverse split).
The purpose for seeking shareholder approval to effect the reverse share split was to increase the market price of the Company’s common shares. The Company believes that the increased market price for its common shares that is expected as a result of implementing the reverse share split will improve the marketability and liquidity of the Company’s common shares and will encourage interest and trading in the Company’s common shares.
Additional information about the reverse share split can be found in the Company’s proxy statement mailed to shareholders on or about April 22, 2020, as supplemented on May 6, 2020, copies of which were furnished to the U.S. Securities and Exchange Commission (the “Commission”) on April 23, 2020 and May 7, 2020, respectively, on the Company’s respective Reports on Form 6-K and is available on the Commission’s website at www.sec.gov.
ABOUT TSAKOS ENERGY NAVIGATION
TEN, founded in 1993 and celebrating this year 27 years as a public company, is one of the first and most established public shipping companies in the world. TEN’s diversified energy fleet currently consists of 68 double-hull vessels, including two suezmax tankers and one LNG carrier under construction, constituting a mix of crude tankers, product tankers and LNG carriers, totalling 7.6 million dwt.
ABOUT FORWARD-LOOKING STATEMENTS
Except for the historical information contained herein, the matters discussed in this press release are forward-looking statements that involve risks and uncertainties that could cause actual results to differ materially from those predicted by such forward-looking statements. TEN undertakes no obligation to publicly update any forward-looking statement, whether as a result of new information, future events, or otherwise.
Tsakos Energy Navigation Ltd.
+30210 94 07 710
Investor Relations / Media
Capital Link, Inc.
+212 661 7566
Markets Insider and Business Insider Editorial Teams were not involved in the creation of this post.
Author: finanzen.net GmbH
Bitcoin Demand Drives $1.4 Billion Ransomware Industry In The U.S.
dpa/picture alliance via Getty Images
Imagine going to your car, and finding that you are unable to unlock the doors or start the engine. Then you notice a message on your phone. It’s a ransom note indicating that your automobile has been locked down and taken hostage. You are required to send bitcoin to an unknown address if you want to release your car. Sound crazy? It shouldn’t. According to security expert Jason Ingalls, Founder and CEO of Ingalls Information Security, this scenario is not too far off from our current reality.
Bitcoin and other cryptocurrencies are fueling a wave of ransomware attacks to the tune of $1.4 billion in the U.S. Hackers encrypt the victim’s data and then require the victim to pay a fee in bitcoin or certain other cryptocurrencies to obtain the decryption key needed to release the data. According to Coveware, which helps companies remediate ransomware, in Q4 2019, victims who paid a ransom to receive decrypting software successfully decrypted 97% of their encrypted data.
Ransomware isn’t new. The first ransomware attack was reported more than thirty years ago. But crypto makes it easier for the bad guys. “Cryptocurrency serves an important role in ransomware’s international chain of wealth transfer from victim to criminal,” says Ingalls.
Privacy coins like Zcash and Monero may get a bad rap for enabling criminal activity, but they are not as prevalent as people think . In fact they represent only 1% of the ransom paid. According to Liat Shetret, senior advisor for crypto policy and regulation for Elliptic, a blockchain analytics company, privacy coins do not spur ransomware. She explains, “privacy coins are not the crypto asset of choice for ransomware because bitcoin is easier to obtain. With privacy coins, the cash-out options are more limited, and that minimizes the hackers ability to mobilize their money.”
Ransomware is the first scalable cybersecurity threat. Ingalls warns that the bad guys are operating at scale. They are organized and there is an ecosystem of cyber criminal activity. According to Ingalls, access experts operate together with ransomware crews on message boards and forums on the dark web. Once they have successfully launched an attack, they remove access to all the data onsite, and hold the keys to recovery. Then the keys are sold to victim businesses, governments, and other organizations for millions in ransom.
Attorney Alex Kanen, whose legal practice is focused on the intersections of real estate, private equity and blockchain, has had clients who received ransom notices that their data had been encrypted. “Their initial response is usually quiet panic,” he explains. “They feel the need to respond to the hackers quickly because the ransom fee usually grows if deadlines are not met, and with little fanfare so as not to draw attention to the security breach. In these situations, a quick response and the right resources are imperative to regain control of the systems and data” he adds. But this is no easy task.
According to Kanen, clients should think twice about dealing with hackers on their own. “Often the stakes are high and you need to bring in an experienced intermediary with the technical know-how to make sure that all of the data is verified and safely recovered.” Kanen advises that there can be legal concerns as well. Clients shouldn’t send crypto to a random wallet. “What if that wallet is associated with terrorists or you are seen as financing illegal activity?” he offers. The intermediary creates a protective layer between the victim and the bad actor.
Maddie Kennedy, communications director at Chainalysis, the blockchain analysis company, encourages victims of ransomware to contact law enforcement. But many victims do not want to call attention to their fraught situation and, therefore, seek to handle the situation privately. According to Kennedy, ransomware is underreported, so it is difficult to quantify the problem. “Anecdotally, you know it is bad,” she says. “Entire cities are held for ransom!” One trend she reports is ‘ransomware as a service,’ or RaaS, where developers of ransomware make their ransomware available to others on the dark web for a fee. This leads to further proliferation of ransomware by a whole new swath of less technical bad actors who may target smaller organizations and individuals. No one is immune.
Since the onset of COVID-19, much of the workforce has shifted from offices to homes. This was done out of necessity and without much notice. Most employers have not considered the security implications of working remotely, nor have they assessed the related security risks.
Hackers also appear to be in a state of transition. Ingalls says, “the ransomware ecosystem has had to adapt to the shifting landscape. Now that we are all working remotely, the bad guys are off doing their research to identify our most vulnerable points. A wave of attacks is coming.”
According to Chainalysis, on-chain data suggests ransomware payments have been stable or even decreased in early March when much of the world was locked down. Kennedy adds that hospitals are still being attacked. “Some attackers said they would lay off hospitals. But that has not happened. They have always been a target” she explains. “When a hospital’s records are held hostage, lives are put in danger. They are more likely to pay.” In fact, it was recently reported by BBC News that University of California San Francisco paid hackers $1.14 million in bitcoin after a ransomware attack in June.
For many small businesses, government agencies, non-profits, and even some large companies who haven’t been targeted, their current level of cybersecurity measures are likely unable to protect against ransomware. Ingalls offers that there are four pillars of security: firewalls, patch management, antivirus and backups. The problem is that these traditional pillars crumble in the face of ransomware. Firewalls can’t see ransomware enter or data leave because it is encrypted. Antivirus software is typically unable to detect these modern threats, and in some cases it is being used to deploy the ransomware that encrypts the data. Patch management is useless against user-driven commands to install and run malware, or stolen credentials. And the backups are hunted down and destroyed before ransomware is used to encrypt everything.
Most ransomware attacks start as phishing email attacks. Hackers bombard employees until one succeeds. It only takes one.
Ingalls relays that one hospital client received ransom notes from two distinct ransom crews that had infiltrated the hospital’s computer’s systems. The hackers had auctioned off access to the hospital twice! The criminals were in-fighting over who would get paid first. Ingalls and his team frantically deployed tools to contain the intrusion and prevent further damage.
Sooner or later the hackers have to cash out their crypto. Sometimes, this is where they get caught. Bitcoin is not anonymous – it is pseudonymous. This means transactions can be traced and tracked. “Bad guys can convert the bitcoin to an alternative cryptocurrency, and completely wash the currency through multiple altcoin transfers, and then move it back to bitcoin,” says Ingalls, “there are so many different ways to wash the currency.”
Not necessarily. Law enforcement can track down bad actors by analyzing their end-to-end transactions across currencies and crypto exchanges. This is not an easy task and it only works when crypto exchanges have KYC/AML (Know Your Customer/Anti-Money Laundering) controls for all of the digital assets that they list. “With transparency into the digital asset on the blockchain, you can immediately identify where the money came from and where it is going,” Shetret explains. “It is not enough (and it is not helpful),” she continues, “for an exchange to have KYC/AML controls for only bitcoin when the the exchange has multiple assets.” In the U.S., crypto exchanges are required to have the same types of KYC/AML controls as banks. Other jurisdictions, however, may not, and this could lead to a concentration of nefarious crypto-related activity in unregulated and under-regulated jurisdictions.
In this time of pandemic, the last thing we want to worry about is cyberthreats. But ransomware is real, and it can infiltrate our lives. Ransomware has been around for years, and crypto is the latest accelerant. It won’t be the last. With more devices coming online, the threat only grows. So what can we do? Stay vigilant. Don’t click on that link.
Author: Andrea Tinianow