• About Us
  • Careers
  • Contact
No Result
View All Result
Tuesday, October 28, 2025
DeFi Planet
  • News
    • People
    • Business
    • Crime
    • Regulation
    • Crypto
    • CBDC
  • Markets
    • Bitcoin
    • Ethereum
    • Stablecoins
    • Altcoins
    • Crypto ETFs
    • Memecoins
  • Policy
  • Articles
    • Press Releases
    • Opinion
    • Explainers
    • Guest Post
    • Sponsored
  • Directory
    • Companies
    • People
    • Products
    • Wallets
  • Multimedia
    • Videos
    • Podcasts
  • Learn
    • DeFi Basics
    • Tutorials
    • Reviews
    • Blockchain Fundamentals
  • Research
    • Case Studies
  • Explore
    • DeFi
    • Crypto Gaming
    • NFT
    • DAO
    • Metaverse
    • Glossary
  • Jobs
  • Markets Pro
    • DeFi Planet Pro
    • Spend Crypto
    • Swap Crypto
    • Coin Prices
    • Crypto Exchanges
    • Crypto Analyzer
  • News
    • People
    • Business
    • Crime
    • Regulation
    • Crypto
    • CBDC
  • Markets
    • Bitcoin
    • Ethereum
    • Stablecoins
    • Altcoins
    • Crypto ETFs
    • Memecoins
  • Policy
  • Articles
    • Press Releases
    • Opinion
    • Explainers
    • Guest Post
    • Sponsored
  • Directory
    • Companies
    • People
    • Products
    • Wallets
  • Multimedia
    • Videos
    • Podcasts
  • Learn
    • DeFi Basics
    • Tutorials
    • Reviews
    • Blockchain Fundamentals
  • Research
    • Case Studies
  • Explore
    • DeFi
    • Crypto Gaming
    • NFT
    • DAO
    • Metaverse
    • Glossary
  • Jobs
  • Markets Pro
    • DeFi Planet Pro
    • Spend Crypto
    • Swap Crypto
    • Coin Prices
    • Crypto Exchanges
    • Crypto Analyzer
No Result
View All Result
DeFi Planet
No Result
View All Result
Home Articles

How blockchain can upscale cyber-security

5 November 2021
in Articles, Opinion
Reading Time: 8 mins read
105 5
36. How blockchain can upscale cyber-security

With the growth of the internet and other technological infrastructures, cyber-attacks have become a common aspect of modern society. Hackers are always trying to break through the security infrastructure of brands globally. Sometimes, they succeed and other times, their attacks hit a brick wall. Once an attack is successful, it negatively affects the goodwill of the brand, and it could even lead to the company getting liquidated. An example of a company that was forced to shut down after a successful hack is Code Spaces.

‘Code Spaces, which was a source code hosting service offering a suite of project management tools to its users, had to shut down in the wake of a devastating hack which wiped away vast amounts of data, backups, machine configurations, and offsite backups. This happened when the attacker initiated a DDoS attack accompanied by an intrusion into Code Spaces’ Amazon EC2 control panel.’

Blockchain became popular as the medium that hosts Bitcoin, Ethereum, and other cryptocurrencies, but the use cases of the technology are astronomical and have grown past being used only for cryptos. It is now being used in different fields like supply chain management, quality monitoring, and even cyber security.

Some notable examples of cyber attacks that took the world by surprise and showed the need for better cyber security techniques will be discussed below. 

• Google China was hit in 2009.

‘When Google’s Chinese headquarters detected a security breach in mid-December, it opened up a whole can of worms implicating the Chinese Government.

Hackers had gained access to several of Google’s corporate servers and intellectual property was stolen.

In a blog, Google said it has “evidence to suggest that a primary goal of the attackers was accessing the Gmail accounts of Chinese human rights activists”. As the company dug deeper, they found numerous Gmail users from the US, China, and Europe had been routinely accessed without permission. Those emails belonged to advocates of human rights in China.

All eyes darted towards the Chinese Government, which has been accused of flagrantly disregarding human rights for years.’

• Verified Twitter accounts were hacked. 

In 2020, the world was ravaged by a pandemic, but that was not the only highlight of that year. Verified Twitter accounts were hacked, and tweets requesting for BTC were sent out from those accounts. Accounts linked to Bill Gates, Elon Musk, Barack Obama, and some other prominent people were hacked ‘seemingly to push a cryptocurrency scam that may have netted upwards of $100,000 in a matter of minutes.’

To solve this issue, the team behind Twitter suspended every account that was verified for over thirty minutes. 

‘Several victims of the hack said they use multi-factor authentication to protect their accounts, but that security feature was of no use.’

• Sony Pictures Cyber Attack of 2014

The popular movie studio was the victim of a hack in 2014, and a substantial amount of data was pilfered, which included the salaries of the executive team in the company, emails that had been exchanged in-house, future movie plans, employees of the movie studio and much more. 

The group behind the hack, the Guardians of Peace, hacked Sony’s infrastructure to stop the movie studio from releasing a comedy that portrayed the murder plot of the North Korean leader. 

According to Vox, ‘They leaked the information to journalists, who wrote about embarrassing things Sony employees had said to each other.’

Use Cases of Blockchain in Cyber Security

Blockchain’s features are improving cyber security in the following ways:

• Blockchain offers distributed storage innovations

Every field in life depends on data to operate. This is one reason why accurate data is sought after in real-time. Before a company can make rational decisions, they need access to the right data. Every business that exists tends to collate data from their clients, and most times, the data is quite sensitive, which could do a lot of damage if it were leaked. 

History has shown that storing data in one spot is unwise because it makes it easy for leaks. This is why distributed storage innovations that blockchain offers can help curb the chances of data being corrupted or leaked.  

With blockchain, hackers can’t corrupt the entire data infrastructure or use a single point of access. Some decentralized data storage structures are outfitted with features that can revoke access if any issue is noticed. 

• Blockchain can encrypt the data transmission process 

Hackers tend to gain access to a data reservoir when the data in it is being transmitted to another source. At the point of the voyage, they exploit the weaknesses and use them to their advantage. During the transmission process, they try to delete it, alter it or download it. Blockchain’s encryption functionality will solve this issue by encrypting the data during the transmission process, thereby ensuring that the integrity of the data remains the same. 

• Blockchain can verify the physical cyber security infrastructures. 

When blockchain is incorporated into a cyber security infrastructure, it can be used to test out the integrity of the data and verify the authenticity of the physical cyber security infrastructure. This technology tends to improve the functioning and trust that people have in the cyber security infrastructure. 

• Blockchain technology improves IoT security

The Internet of Things is an important aspect of modern technology and it involves devices that interact all over the globe like smart security cameras and so on. With the Internet of Things, there has been a rise in the adoption of smart homes and other related products. 

The weaknesses in this technology have been exploited in the past on several occasions. For instance, some smart devices in the home of a couple in Wisconsin were attacked. 

If blockchain is incorporated into IoT devices, it could make them wiser to make decisions to protect themselves during a hack and remove any node that acts suspiciously, instead of waiting for a command from a centralized body. For now, it is easier for hackers to access IoT devices because of the centralization element, which will change once the decentralized technology is added to the mix. In a typical blockchain, data is distributed in different nodes and easily transmitted with topmost security, which IoT can benefit from once both worlds collide. 

Why is it necessary to use blockchain for security?

Out of the different technologies in existence, the blockchain seems to be one of the most secure. Though it may have its flaws, it has grown to offer incredible features to cryptocurrencies. 

Blockchain is important in cybersecurity because of its decentralized nature. When a node is corrupted in a decentralized network, it doesn’t affect the functioning of the entire network. The node is instantly disconnected from the network, thereby reducing the chances of an attacker wreaking havoc in the platform. The same can’t be said for a centralized authority because once the hacker gains access, it is easy to manipulate and cause intense damage because the data storage and control are in the hands of a single party. Blockchain technology can change this. 

Future Predictions Of Blockchain Technology In Handling Security

Regularly, new and more advanced solutions are incorporated into the world, and they come with incredible features. With these features comes bigger risks of being attacked by hackers, who are on the lookout for loopholes to exploit. 

The need for IoT is rising, and with it, there has been an increase in hacks. Devices interact with one another and communicate their data to a centralized source, which can be attacked. 

In the coming years, it is expected that the encryption aspect of blockchain technology will be integrated into IoT, social media, and other technologies to create a standard security protocol.

Apart from the aforementioned, adding decentralized technology will introduce transparency. Many hackers love to attack centralized entities because of the anonymity that it offers. The addition of the transparent element could deter many from trying their luck. 

Challenges  associated with infusing blockchain into security

Though blockchain may come with its perks, it still has some issues that need to be considered. 

• Phishing attacks

Many tend to overlook that they could suffer phishing attacks from intruders because of the high security of blockchain technology. This type of attack has been around for a long time, and it is still quite successful in fleecing so many of their funds. An example is when the owner of a crypto account in exchange receives an email requesting for them to log in through a link. If the person uses that link to type in their personal details, they lose the funds in their account. For those that use Twitter, mentioning the words ‘Trust Wallet’ in a tweet will send an army of bots towards you, claiming that they are the support team that handles issues linked to the wallet. They then request the person to send their recovery phrase, and if this is provided, the user loses every cent in that wallet.  

 • The possibility of 51% Attacks

Blockchain is highly secure, but with a large amount of computing power and 51% of nodes in the power of one entity, it could be disastrous. When this occurs, double-spending could occur. In the past, 51% of successful attacks have occurred like in the case of ZenCash.

• Third-party issues 

Blockchain may be secure, but the third parties and endpoints linked to it can be compromised easily. The chance of a block being altered is next to impossible because of the computing power needed, but an Ether that is stored in a wallet can be a victim of a compromise. Third parties that connect to the blockchain can also be hacked especially if they have loopholes. 

In Conclusion…

  • Blockchain can improve the current state of cyber security by heightening transparency.
  •  Blockchain adds an extra layer of security to IoT devices. 
  • The use cases of this technology have continuously evolved and expanded. 
  • Though blockchain technology is innovative, it is still plagued with issues like third-party issues, the possibility of 51% attack, and much more.
  • The risks that come with blockchain pales in comparison with the cybersecurity issues that businesses face daily.

If you would like to read more articles like this, follow DeFi Planet on Twitter and LinkedIn.

Share64Tweet40Share11
Rose Nnamdi

Rose Nnamdi

Related Posts

The Password Apocalypse: Can Blockchain Digital Identity Save Us?
Articles

The Password Apocalypse: Can Blockchain Digital Identity Save Us?

26 October 2025
The State of DeFi in Africa: Challenges and Growth Potential Ahead
Articles

The State of DeFi in Africa: Challenges and Growth Potential Ahead

26 October 2025
Articles

Decentralized Timekeeping: Who Sets the Clock in Web3?

22 October 2025
Ethereum vs Bitcoin: Innovation vs Stability — Which Strategy Will Win the Next Decade?
Articles

Ethereum vs Bitcoin: Innovation vs Stability — Which Strategy Will Win the Next Decade?

19 October 2025

Editors Picks

Mining vs. Staking: Which Crypto Validation Method Will Shape the Future?

Mining vs. Staking: Which Crypto Validation Method Will Shape the Future?

byOlajumoke Oyaleke
15 July 2025
0

Where Are the Ethereum-Killers Now?

Where Are the Ethereum-Killers Now?

byOlayinka Sodiqand1 others
6 January 2025
0

source: investorplace.com

How to Find the Newest Cryptocurrencies Before They’re Listed

byOlayinka Sodiq
30 December 2024
0

Exploring the Role of AI in Enhancing DeFi Security

Exploring the Role of AI in Enhancing DeFi Security

byOlayinka Sodiq
1 October 2024
0

The Ultimate Guide to How NFT Royalties Work

The Ultimate Guide to How NFT Royalties Work

byAdedamola Ojedokun
17 April 2024
0

Read More

Chain of Thoughts

The Aesthetics of Web3: Why Vibe Matters in Decentralized Communities

The Aesthetics of Web3: Why Vibe Matters in Decentralized Communities

byOlu Omoyele
27 September 2025
0

...

Zero-Knowledge Everything: Trust, Privacy, and Verification in the Digital Age

Zero-Knowledge Everything: Trust, Privacy, and Verification in the Digital Age

byOlu Omoyele
30 August 2025
0

...

What Happens When AI Gets a Wallet?

What Happens When AI Gets a Wallet?

byOlu Omoyele
31 July 2025
0

...

The Game-changing Triumvirate: Blockchain, Data Science, and Artificial Intelligence

The Game-changing Triumvirate: Blockchain, Data Science, and Artificial Intelligence

byOlu Omoyele
30 June 2025
0

...

Markets Update

Can Confidential Lending Unlock Trillions for DeFi Markets?

7 hours ago

Impact of Large Ethereum Validator Exits on ETH Price

8 hours ago

Leading Asset Classes in the On-Chain Real-World Asset Tokenization Trend

8 hours ago

KuCoin Pay Partners with Swapped Connect to Streamline Direct CEX Payments for Web3 Users

11 hours ago

Are Ethereum-Based Treasuries Emerging as the Berkshire Hathaway of Crypto?

3 days ago

Is the Crypto Market Now Majorly Driven by Institutions?

3 days ago
Read More

Events

  • No events
  • Spotlight

    All about Ethereum
    All about Algorand
    All about Bitcoin
    All about Gora

    Press Releases

    Swiss Bitcoin App Relai Acquires MiCA License in France

    bychainwire
    27 October 2025
    0

    River Public Sale – 48-Hour Dutch Auction Lowest Price Settlement, Claim and Refund Instantly After End

    bychainwire
    27 October 2025
    0

    Jiuzi Holdings, Inc. Partners with SOLV Foundation on $2.8B TVL Bitcoin Initiative to Advance Crypto Treasury Strategy

    bychainwire
    27 October 2025
    0

    MultiBank Group and Khabib Nurmagomedov Launch an Exclusive Worldwide Multi-Billion-Dollar Joint Venture to Build the World’s First Regulated Tokenized Sports Ecosystem.

    bychainwire
    25 October 2025
    0

    RIVER Gains 5x Following Binance Perp Listing, Supported by Time-Encoded Airdrop Conversion

    bychainwire
    24 October 2025
    0

    Read More

    ADVERTISING

    ABOUT

    TEAM

    CAREERS

    CONTACT

    TERMS & CONDITIONS

    PRIVACY POLICY

    © Copyright 2025 DeFi Planet

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • News
      • People
      • Business
      • Crime
      • Regulation
      • Crypto
      • CBDC
    • Markets
      • Bitcoin
      • Ethereum
      • Stablecoins
      • Altcoins
      • Crypto ETFs
      • Memecoins
    • Policy
    • Articles
      • Press Releases
      • Opinion
      • Explainers
      • Guest Post
      • Sponsored
    • Directory
      • Companies
      • People
      • Products
      • Wallets
    • Multimedia
      • Videos
      • Podcasts
    • Learn
      • DeFi Basics
      • Tutorials
      • Reviews
      • Blockchain Fundamentals
    • Research
      • Case Studies
    • Explore
      • DeFi
      • Crypto Gaming
      • NFT
      • DAO
      • Metaverse
      • Glossary
    • Jobs
    • Markets Pro
      • DeFi Planet Pro
      • Spend Crypto
      • Swap Crypto
      • Coin Prices
      • Crypto Exchanges
      • Crypto Analyzer

    © Copyright 2024 DeFi Planet   |   Terms & Conditions   |   Privacy Policy

    -
    00:00
    00:00

    Queue

    Update Required Flash plugin
    -
    00:00
    00:00