• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cryptocurrency • Cybersecurity • Endpoint Security  /  Cryptocurrency- The Good, The Bad & The Ugly
06 February 2018

Cryptocurrency- The Good, The Bad & The Ugly

Written by Seqrite
Seqrite
Cryptocurrency, Cybersecurity, Endpoint Security
  • 4
    Shares
Estimated reading time: 3 minutes

Cryptocurrency is the current buzzword of this day and age. Not a day goes by when there’s not a news item about cryptocurrency, either with warnings about its danger or breathless coverage of its fluctuating value. Without doubt, it’s a unique revolutionary concept: a form of currency which is completely decentralized.

But before going into the pros and cons, it is important to know what exactly cryptocurrency is and how it functions. Investopedia defines this currency as “a digital or virtual currency that uses cryptography for security”. An important feature of cryptocurrency is there is no central authority behind it and it is organic, hence making it immune to government interference or manipulation. There is also no physical representation of this currency. It may be used online or in-person with vendors who accept them.

How does it work?

The most prominent cryptocurrency is Bitcoin, the first decentralized digital currency, invented by Satoshi Nakamoto in 2009. It is organized through a network known as a blockchain, an online ledger that keeps a secure record of transactions. Bitcoins can be bought on online cryptocurrency exchanges or mined using specialized, powerful hardware. There are other cryptocurrencies as well, which have been termed “Altcoin” but they work on similar lines with some difference. There are other intricacies involved in cryptocurrency but their two main important features are i) their anonymity and ii) their volatility.

Since cryptocurrency is decentralized with no single governing body overseeing the currency (e.g. The Reserve Bank of India which oversees the Indian rupee), it offers an anonymity which means it is often used for shady purposes. Most hackers using ransomware demand payments in Bitcoin as it is anonymous. It is often used for illegal transactions and thus does not have a very scrupulous reputation.

On the other hand, cryptocurrency can be incredibly volatile, with its value soaring on a day-to-day basis, making it quite unstable. The value of a Bitcoin reached a high of $20,000 in 2017 before coming back to less than $8000 in February, 2018. The high valuation obviously evoked a lot of interest worldwide but anyone who wishes to invest in it must stay aware of all the issues before doing so.

Read More: In-browser cryptojacking at full throttle!

The Good

Without doubt, cryptocurrency has its own set of advantages. Some of them are:

  • No entry barriers: Anyone can use cryptocurrency. There are no entry barriers – anyone can buy them or if they have the sufficient hardware, mine them. This makes it flexible.
  • Anonymity and Privacy: As mentioned earlier in the article, cryptocurrencies like Bitcoin are anonymous and private. The absence of a centralized authority means Bitcoin users can operate in silos, without having to reveal details about themselves.
  • Fast and easy payments: Unlike conventional payments which can recur transaction charges, Bitcoin payments can be fast and easily, without the burden of additional costs. A user only needs to know the address of the wallet and they will be able to transfer it.
  • Security: Considering that the entire process involves cryptography, using this kind of currency offers a high level of security.

The Bad

But there are certain issues with cryptocurrency as well. They are:

  • No reversal of payment – There’s no refunds or changing your mind when it comes to cryptocurrency. Once a payment is made, it is done and there is no way to get the money back.
  • Volatility –A volatile currency means that there is no stability in its usage. The value of a Bitcoin can change massively in a day, affecting all its users and causing uncertainty in the market.
  • Illegal activities –Bitcoin is widely used for a range of illegal activities, ranging from illicit drug activity, money-laundering to malware. Users must be very careful of its usage.
  • Still very new –Cryptocurrency is still a very new concept and most world governments have been unsure how to deal with it. Bitcoin is illegal in some countries with its status unknown in many others.

The Ugly:

The current cryptocurrency craze can often have harmful consequences. A Quick Heal Security Labs investigation found suspicious apps on Google Play Store claiming to mine cryptocurrecny using Android devices. However, they do nothing of that sort, misguiding the user. There are also in-browser cryptojacking attacks, where code is embedded in a website.

Ultimately, cryptocurrencies such as Bitcoin may resemble the future but it is important to not get carried away and evaluate all the risks before investing.

As an IT security partner for your business, Seqrite provides comprehensive endpoint security from advanced cyber threats. To know more, visit our website or

seqrite_cta1

 Previous PostFind out how safe you are on the Internet! Take this Quiz.
Next Post  Cryptomining Malware: The New Favorite of Hackers
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • Turn the Page Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Building a holistic cybersecurity strategy to safeguard the pharma sector

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021
  • Data breach volumes worry governments and businesses

    The Data breach inferno burning big-ticket businesses

    February 5, 2021

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • The Data breach inferno burning big-ticket businesses The Data breach inferno burning big-ticket businesses February 5, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks Pharma Sector needs to streamline its insides to avoid cyberattacks February 12, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond Turn the Page: Cybersecurity Predictions for 2021 & beyond February 18, 2021

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Businesses now worried about the surge in COVID-19 infodemic

    Businesses now worried about the surge in COVID-19 infodemic

    February 26, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (279) cyber security (25) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.