Latest news with #EthereumNameService
Yahoo
13-05-2025
- Business
- Yahoo
Top Altcoins of the Week: Altcoin Market Pops As ETH, PI, And PEPE Post Double-Digit Gains
Benzinga and Yahoo Finance LLC may earn commission or revenue on some items through the links below. This week brought a wave of momentum across the altcoin market, fueled by Bitcoin's strength and growing optimism around macro developments like the recent U.S.-U.K. trade deal. The total altcoin market cap—including Ethereum—briefly surged more than 17% before cooling off late Friday, now sitting at $1.16 trillion. Here's a look at the five top-performing altcoins that led the charge. Don't Miss: — no wallets, just price speculation and free paper trading to practice different strategies. Grow your IRA or 401(k) with Crypto – . Ethereum Name Service, or ENS, simplifies blockchain interactions by allowing users to register human-readable domain names for Ethereum wallet addresses. Current price: $22.50 Gained 22% on the week but gave back 6% of daily gains Friday. Rejecting from March 2 highs, a significant resistance level. Bullish structure remains intact if it holds above $21. Pi Network aims to make cryptocurrency more inclusive by enabling users to mine coins directly from their mobile phones without advanced hardware. Current price: $0.7389 Up 24% this week, now retesting April 14 highs. Traders are watching closely to see if it can break through this zone or get rejected. Ethereum is the leading smart contract platform that powers decentralized applications, DeFi protocols, and NFT ecosystems. Current price: $2,339 Hit a high of $2,490 before giving back around 5% from Friday's gains. Currently rejecting from March 2 resistance, a key supply area. Trending: New to crypto? on Coinbase. Pyth Network provides decentralized real-time market data to smart contracts by aggregating price feeds from major exchanges and institutions. Current price: $0.197 Gained 31% in just two days but still down 82% from all-time highs. Approaching key resistance at the $0.20 mark; breakout or rejection could determine short-term direction. Pepe is a meme-based cryptocurrency inspired by the internet character "Pepe the Frog," thriving on viral culture and speculative trading. Current price: $0.000012285 Biggest gainer this week, rising 43% with a midweek peak over 70%. Pulled back like most altcoins late Friday but still ended strong. Highly speculative with extreme volatility—traders should tread carefully. The strong performances from altcoins this week highlight renewed confidence in the broader crypto market, but that excitement should be balanced with caution. Many of these assets remain well below their all-time highs—some still down over 70%. Rather than reacting to short-term percentage spikes, investors would be wise to evaluate real-world utility, tokenomics, and long-term viability. Timing and patience remain key. Stick to your plan, manage your exposure, and remember: solid entries often come after the hype fades. Read Next: A must-have for all crypto enthusiasts: . 'Scrolling To UBI' — Deloitte's #1 fastest-growing software company allows users to earn money on their phones. Image: Shutterstock Send To MSN: 0 This article Top Altcoins of the Week: Altcoin Market Pops As ETH, PI, And PEPE Post Double-Digit Gains originally appeared on Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data


New York Post
07-05-2025
- New York Post
Tech expert warns of ‘extremely sophisticated' new Gmail scam claiming to be from ‘law enforcement'
It's a digital wolf in sheep's clothing. Phishing messages are becoming nearly indistinguishable from the real deal. Now, techsperts are warning of a super 'sophisticated' Google spoofing scheme in which cybercriminals use legitimate-looking Gmail communications to hijack user accounts. Nick Johnson, the lead developer of Ethereum Name Service (ENS), brought this digital Trojan Horse to light in a series of X posts. Advertisement 'Recently I was targeted by an extremely sophisticated phishing attack, and I want to highlight it here,' he wrote while describing the chameleonic scheme. 'It exploits a vulnerability in Google's infrastructure, and given their refusal to fix it, we're likely to see it a lot more.' In this case, the phishing scam was disguised as an official request by law enforcement. 3 To make things more confusing, the email (pictured) originated from an official no-reply on Google's domain. @nicksdjohnson/X Advertisement 'This notice is to alert you that a subpoena was issued to Google LLC by a law enforcement that seeks retrieval of information contained in your Google account,' it read, per a screenshot of the message. 'To examine the case materials or take measures to submit a protest, please do so in the provided Google Support Case.' Upon clicking on 'upload additional documents' or 'view case,' the user is taken to a sign-in page to input their credentials, whereupon bad actors will presumably use them to commander their account. 'I haven't gone further to check,' Johnson noted. 3 Hackers trick people into inputting the credentials, which they then use to compromise their Gmail accounts. issaronow – Advertisement The correspondence was particularly insidious as it linked to a very convincing 'support portal' page. The cyberspoofers also used Google Sites — a free web-based platform for creating websites without needing coding skills — 'because they know people will see the domain is and assume it's legit,' said Johnson. To make things more confusing, the email originated from an official no-reply on Google's domain and was filed 'in the same conversation as other, legitimate security alerts,' the tech whiz warned. 3 In light of the incident, Johnson is calling on Google to disable scripts and arbitrary embeds in Sites to make Gmail less susceptible to phishing. Backcountry Media – Advertisement How did the hackers manage to fly under the radar? Johnson pointed to 'two vulnerabilities in Google's [infrastructure] that they have declined to fix.' He wrote that the legacy product dates back to 'before Google got serious about security,' and allows anyone to host content on a subdomain, including nefarious embeds and scripts such as the above. 'Obviously, this makes building a credential harvesting site trivial; they simply have to be prepared to upload new versions as old ones get taken down by Google's abuse team,' Johnson said. Fortunately, there are a few ways to suss out this masquerade. For one, while the header is signed by it is sent via and sent to the address 'me@blah,' the cybersecurity maven wrote. Also suspect, per Johnson is that there is 'a lot of whitespace' below the phishing message 'followed by 'Google Legal Support was granted access to your Google Account' and the odd me@… email address again.' Advertisement In light of the incident, Johnson is calling on Google to disable scripts and arbitrary embeds in Sites to make Gmail less susceptible to phishing. The Post has contacted Google for comment.
Yahoo
07-05-2025
- Yahoo
Don't Fall for This 'Extremely Sophisticated' New Gmail Scam
Gmail users, beware—a new scam is on the rise, and one tech expert warns it's "extremely sophisticated." Nick Johnson, the lead developer of Ethereum Name Service (ENS), was the first to draw attention to the sneaky new scam, which involves scammers spoofing Google to create legitimate-looking communications. They use those emails to convince Gmail users to enter their Google credentials, which they can then use to take control of your account. Johnson was targeted by the scam recently and warns that it "exploits a vulnerability in Google's infrastructure," which could lead to even more of the cyber attacks. The email came from a legitimate no-reply at Google's domain, and was even filed within the same thread as other actual communications from the internet giant. It implied that the recipient's personal account information had been subpoenaed by law enforcement and offered a link to "examine the case materials" or "submit a protest," which drives to "a very convincing 'support portal' page" using Google Sites, making it seem even more legitimate with the Google domain in the URL. There are a few clues that identify it as not real, though, including a header signed by but sent by and a strange recipient address. Additionally, at the bottom of the message is "a lot of by 'Google Legal Support was granted access to your Google Account' and a repeat of the strange recipient address. According to the FTC, if you receive this or any other phishing email, you can report it by forwarding it to the Anti-Phishing Working Group at reportphishing@ or to the FTC at Related: Don't Fall for This Scam Offering Hoka Sneakers for an Impossible Price
Yahoo
06-05-2025
- Yahoo
Gmail Users Warned of 'Extremely Sophisticated' Scam
If you have a Gmail account, you should be on the lookout for an "extremely sophisticated" scam that could leave your account at risk. The scam involves cybercriminals creating emails that appear to be official messages coming from Google. They use those emails to persuade people into handing over their Google account credentials and take over their accounts. The scam was first identified and spread by Nick Johnson, the lead developer of the Ethereum Name Service (ENS). He called the attack "extremely sophisticated." He also warned that, given that it exploits a flaw in Google's infrastructure, there's a chance we could see more of these attacks. "Recently I was targeted by an extremely sophisticated phishing attack, and I want to highlight it here. It exploits a vulnerability in Google's infrastructure, and given their refusal to fix it, we're likely to see it a lot more," Johnson wrote in his post on X. The email, which Johnson shared, appeared to warn potential victims about a subpoena enticing them to click on a link in the email. "This notice is to alert you that a subpoena was issued to Google LLC by a law enforcement that seeks retrieval of information contained in your Google Account," the email from the Cybercriminals read. "To examine the case materials or take measures to submit a protest, please do so in the provided Google Support Case." As Johnson explains, the email directed people to the URL instead of They look similar, but there is a very important difference: anyone with a Google account can create a website on which is what the cybercriminals did to try to mimic the official Google site. If the victim clicked either 'Upload additional documents' or 'View case', they were redirected to an exact copy of the Google sign-in page designed to steal their login credentials. In order to avoid scams like this, Malwarebytes Labs had a few suggestions: Don't follow links in unsolicited emails or on unexpected websites Carefully look at the email headers when you receive an unexpected mail Verify the legitimacy of such emails through another, independent method Don't use your Google account (or Facebook for that matter) to log in at other sites and services. Instead create an account on the service itself. So next time you get an email like this, be careful before clicking any links or entering your login credentials.


Irish Daily Mirror
30-04-2025
- Irish Daily Mirror
All Irish Gmail users 'at risk' - follow 4 crucial steps to keep account safe
Every Gmail user in Ireland is being warned about an alarming new threat that could jeopardise the security of their email accounts. Security experts are raising the alarm over an "extremely sophisticated" tactic that is fooling even tech-savvy users into falling for it. The attack, which has been dubbed a 'clever replay attack', was first identified by Nick Johnson, a lead developer of Ethereum Name Service, and puts users at risk of online fraud. It involves cybercriminals sending emails that appear to come directly from Google, making them seem highly legitimate and able to slip past even the most effective spam filters. In this particular attack, the email looks almost identical to an official communication from Google. It suggests that a legal subpoena has been issued and access to the recipient's Gmail account is required. The email address and domain appear to be genuine, making the scam difficult to spot. Nick explained: "The first thing to note is that this is a valid, signed email - it really was sent from no-reply@ It passes the DKIM signature check, and Gmail displays it without any warnings." The only reason tech-savvy Nick spotted something was wrong is that the official site should have been hosted on a platform called - instead it appeared on The difference is that anyone with a Google account can create a website on And that is exactly what the cybercriminals did. It's definitely not a warning anyone should ignore, as falling for the trick could give scammers full access to accounts and highly personal data, Mirror UK reports. Google has responded to the scam, confirming that they are working on an update to address the issue and prevent further incidents. A spokesperson told Newsweek: "We're aware of this class of targeted attack from the threat actor, Rockfoils, and have been rolling out protections for the past week." Despite the company's efforts, it's crucial for all Irish Gmail users to remain vigilant when checking their daily batch of emails and protect their accounts by following some simple yet crucial steps. Security experts at Malwarebytes have worryingly warned that "all Gmail users are at risk from clever replay attack". They have shared four important steps every Irish Gmail user must take to safeguard their account: