• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cryptocurrency • Cybersecurity • Endpoint Security  /  Cryptocurrency- The Good, The Bad & The Ugly
Cryptocurrency- The Good, The Bad & The Ugly
06 February 2018

Cryptocurrency- The Good, The Bad & The Ugly

Written by Seqrite
Seqrite
Cryptocurrency, Cybersecurity, Endpoint Security
4
Shares

Cryptocurrency is the current buzzword of this day and age. Not a day goes by when there’s not a news item about cryptocurrency, either with warnings about its danger or breathless coverage of its fluctuating value. Without doubt, it’s a unique revolutionary concept: a form of currency which is completely decentralized.

But before going into the pros and cons, it is important to know what exactly cryptocurrency is and how it functions. Investopedia defines this currency as “a digital or virtual currency that uses cryptography for security”. An important feature of cryptocurrency is there is no central authority behind it and it is organic, hence making it immune to government interference or manipulation. There is also no physical representation of this currency. It may be used online or in-person with vendors who accept them.

How does it work?

The most prominent cryptocurrency is Bitcoin, the first decentralized digital currency, invented by Satoshi Nakamoto in 2009. It is organized through a network known as a blockchain, an online ledger that keeps a secure record of transactions. Bitcoins can be bought on online cryptocurrency exchanges or mined using specialized, powerful hardware. There are other cryptocurrencies as well, which have been termed “Altcoin” but they work on similar lines with some difference. There are other intricacies involved in cryptocurrency but their two main important features are i) their anonymity and ii) their volatility.

Since cryptocurrency is decentralized with no single governing body overseeing the currency (e.g. The Reserve Bank of India which oversees the Indian rupee), it offers an anonymity which means it is often used for shady purposes. Most hackers using ransomware demand payments in Bitcoin as it is anonymous. It is often used for illegal transactions and thus does not have a very scrupulous reputation.

On the other hand, cryptocurrency can be incredibly volatile, with its value soaring on a day-to-day basis, making it quite unstable. The value of a Bitcoin reached a high of $20,000 in 2017 before coming back to less than $8000 in February, 2018. The high valuation obviously evoked a lot of interest worldwide but anyone who wishes to invest in it must stay aware of all the issues before doing so.

Read More: In-browser cryptojacking at full throttle!

The Good

Without doubt, cryptocurrency has its own set of advantages. Some of them are:

  • No entry barriers: Anyone can use cryptocurrency. There are no entry barriers – anyone can buy them or if they have the sufficient hardware, mine them. This makes it flexible.
  • Anonymity and Privacy: As mentioned earlier in the article, cryptocurrencies like Bitcoin are anonymous and private. The absence of a centralized authority means Bitcoin users can operate in silos, without having to reveal details about themselves.
  • Fast and easy payments: Unlike conventional payments which can recur transaction charges, Bitcoin payments can be fast and easily, without the burden of additional costs. A user only needs to know the address of the wallet and they will be able to transfer it.
  • Security: Considering that the entire process involves cryptography, using this kind of currency offers a high level of security.

The Bad

But there are certain issues with cryptocurrency as well. They are:

  • No reversal of payment – There’s no refunds or changing your mind when it comes to cryptocurrency. Once a payment is made, it is done and there is no way to get the money back.
  • Volatility –A volatile currency means that there is no stability in its usage. The value of a Bitcoin can change massively in a day, affecting all its users and causing uncertainty in the market.
  • Illegal activities –Bitcoin is widely used for a range of illegal activities, ranging from illicit drug activity, money-laundering to malware. Users must be very careful of its usage.
  • Still very new –Cryptocurrency is still a very new concept and most world governments have been unsure how to deal with it. Bitcoin is illegal in some countries with its status unknown in many others.

The Ugly:

The current cryptocurrency craze can often have harmful consequences. A Quick Heal Security Labs investigation found suspicious apps on Google Play Store claiming to mine cryptocurrecny using Android devices. However, they do nothing of that sort, misguiding the user. There are also in-browser cryptojacking attacks, where code is embedded in a website.

Ultimately, cryptocurrencies such as Bitcoin may resemble the future but it is important to not get carried away and evaluate all the risks before investing.

As an IT security partner for your business, Seqrite provides comprehensive endpoint security from advanced cyber threats. To know more, visit our website or

seqrite_cta1

 Previous PostFind out how safe you are on the Internet! Take this Quiz.
Next Post  Cryptomining Malware: The New Favorite of Hackers
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • Lured and Compromised: Unmasking the Digital Danger of Honey Traps

    June 17, 2025
  • How Seqrite Endpoint Protection Blocks Non-Human Threats like Bots, Scripts, and Malware

    June 9, 2025
  • Operation Sindoor – Anatomy of a Digital Siege

    May 23, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (326) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies