HP Security Research Blog
The HP Security Research blog provides a platform for security experts from across HP to discuss innovative research, industry observations, and updates on the threat landscape to help organizations proactively identify and manage risk.

HP Security Briefing, episode 15 - Bitcoin and security

In the July 2014 Security Briefing we look at Bitcoin, the largest of the emerging class of value-exchange mechanisms called cryptocurrencies.

Bitcoin and security (part 3 of 3)

In the final post of our Bitcoin series, we look at the possibilities for cybercrime involving the cryptocurrency – as a target, as an exchange mechanism, and as a contributing element.

Bitcoin and Security: part 2 of 3

Delving more deeply into the mechanisms of Bitcoin, I examine how Bitcoin tackles two potential problems – counterfeiting and the fair distribution of currency – through interesting architectural choices, and show how two potential “wrongs” not only make a right, but provide fundamental strength to the system.

Bitcoin and security (part 1 of 3)

In the first post of a three-part series, we look at Bitcoin basics: how it works, where its security profile fits into the eternal confidentiality-integrity-availability triad, and why the underpinnings of the currency are a noteworthy attempt to solve one of Internet security’s thorniest problems. We also take a peek at the guts of a Bitcoin ATM – and recognize a familiar operating system under the hood.

Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.