The need for open source security in medical devices – ITProPortal

Wireless and wearable technologies have brought about dramatic improvements in healthcare, allowing patients mobility while providing healthcare professionals with easier access to patient data. Many medical devices that were once tethered to patients, positioned next to hospital beds, or at a fixed location, are now transportable. Evolving from the traditional finger-prick method of glucose monitoring, wearable devices equipped with sensors and wireless connectivity now assist with monitoring blood sugar levels, connect with health-care providers, and even deliver medication. Critical life-sustaining devices, such as pacemakers, can be checked by doctors using wireless technology and reduce the time a patient needs to spend at the hospital while allowing the doctor to react more rapidly to patient problems.

A major driver of the technological revolution in medical devices is software, and that software is built on a core of open source. Black Ducks 2017 Open Source Security and Risk Analysis (OSSRA) research found that the average commercial application included almost 150 discrete open source components, and that 67 per cent of the over 1000 commercial applications scanned included vulnerable open source components. The analysis made evident that the use of open source components in commercial applications is pervasive across every industry vertical, including the healthcare industry.

The arguments for using open source are straightforward open source lowers development costs, speeds time to market, and accelerates innovation. When it comes to software, every manufacturer wants to spend less time on what are becoming commodities such as the core operating system and connectivity and focus on features that will differentiate their brand. The open source model supports that objective by expediting every aspect of agile product development.

But visibility and control over open source are essential to maintain the security and code quality of medical device software and platforms.

Over two million patients in the United States have implanted devices, including pacemakers and implantable cardioverter-defibrillators. More than seven million patients now benefit from remote monitoring and the use of connected medical devices as an integral part of their care routines.

While the software used in the vast majority of medical devices is closed and proprietary to prevent commercial rivals from copying each other's code, that software usually contains a wealth of open source components. The OSSRA study I cited earlier found open source in 46 per cent of the commercial applications associated with the healthcare, health tech, and life sciences sector.

Researchers Billy Rios and Jonathan Butts recently acquired hardware and supporting software for four different brands of pacemakers and looked for weaknesses in architecture and execution. One of the biggest issues noted in the paper they published was one Black Duck sees time and again unpatched software libraries.

All four pacemakers examined contained open source components with vulnerabilities, and roughly 50 per cent of all components included vulnerabilities. Most shockingly, the pacemakers had an average of 50 vulnerabilities per vulnerable component and over 2,000 vulnerabilities per vendor.

When patient safety is a function of software, the issue of software security becomes paramount particularly when it comes to medical devices. But, secure software is an ephemeral concept. What we think of as secure today can change overnight as new vulnerabilities are discovered and disclosed. As code ages, the probability is high that more vulnerabilities are likely to be disclosed. An average 3,600 new open source vulnerabilities are discovered every year (though still far less than that reported in commercial code).

Open source is neither more nor less secure than custom code. However, there are certain characteristics of open source that make vulnerabilities in popular components very attractive targets for hackers. The return on investment for an open source vulnerability is high. A single exploit can be used to compromise hundreds or thousands of applications using that vulnerable component.

Whether open source or proprietary code, most known vulnerabilities like Heartbleed, and the SMB vulnerability exploited in the WannaCry ransomware attacks, have patches available on the date of their public disclosure. But, despite the availability of patches, an alarming number of both companies and individuals simply do not apply them. Months after Microsoft issued its security patch, thousands of computers remain vulnerable to the WannaCry exploit for a variety of reasons, ranging from the use of bootleg software to simple neglect.

Patches often arent applied because of concerns that the patch might break a currently-working system. Each time a patch is introduced, changing a system can impact its reliability and functionality. Healthcare organisations, for example, often will put functionality and uptime as a higher priority than security, and in doing so expose themselves to attack on unpatched and vulnerable applications.

In other cases, its a lack of insight organisations are simply unaware of a critical vulnerability or its patch until theyre under attack. While software vendors like Microsoft can push updates and fixes out to users, open source has a pull support model. Unlike most proprietary software, users of open source are responsible for keeping track of vulnerabilities as well as fixes and updates for the open source they use rather than having those fixes pushed out to them. Unless a vendor is aware that a vulnerable open source component is included in its application(s), its highly probable that that component will remain unpatched.

Rios and Butts paper didnt state if the researchers checked for software/firmware updates from the vendors prior to analysis. My assumption is that they did not, but whether this would have made a real-world difference is arguable, Black Ducks own research indicates that vendors are typically unaware of all of the open source they use, since it can enter the code base in so many ways. On average, prior to having a Black Duck code scan, our customers were aware of less than half of the third-party libraries they use.

To be clear, the problem isnt the use of open source. Its the fact that open source is often invisible to those using it. Vulnerabilities in open source may open up users to targeted or non-targeted attacks. Depending on the software (home monitoring, physician, programmer, etc.) the attack could affect a single patient or an entire practice. When the WannaCry ransomware spread across the world, multiple U.K. hospitals reported that their radiology departments were completely knocked out by the outbreak.

If the attack is on implantable medical devices, this could become a life or death decision.

Unless the medical device software supply chain carefully tracks the open source they use, and maps that open source to the thousands of vulnerabilities disclosed every year, they will be unable to protect their applicationsand their customersfrom those vulnerabilities.

To make progress in defending against open source security threats and compliance risks, both medical device manufacturers and their suppliers must adopt open source management practices that:

Fully inventories open source software: Organisations cannot defend against threats that they do not know exist. A full and accurate inventory (bill of materials) of the open source used in their applications is essential.

Map open source to known security vulnerabilities: Public sources, such as the National Vulnerability Database provide information on publicly disclosed vulnerabilities in open source software. Organisations need to reference these sources to identify which of the open source components they use are vulnerable.

Identify license and code quality risks: Failure to comply with open source licenses can put organisations at significant risk of litigation and compromise of IP. Likewise, use of out-of-date or poor quality components degrades the quality of applications that use them. These risks also need to be tracked and managed.

Enforce open source risk policies: Many organisations lack even basic documentation and enforcement of open source policies that would help them mitigate risks. Manual policy reviews are a minimum requirement, but as software development becomes more automated so too must management of open source policies.

Alert on new security threats: With more than 3,600 new open source vulnerabilities discovered every year, the job of tracking and monitoring vulnerabilities does not end when applications leave development. Organisations need to continuously monitor for new threats as long as their applications remain in service.

As open source use continues to increase, effective management of open source security and license compliance risk is becoming increasingly important. By integrating risk management processes and automated solutions into their product lifecycle, medical device manufacturers can maximise the benefits of open source use while effectively managing its risks.

Mike Pittenger, Vice President of Security Strategy, Black Duck Software Image Credit: Photo_Concepts / iStock

Original post:
The need for open source security in medical devices - ITProPortal

Monthly quiz: Test yourself on open source development tools trends – TechTarget

The move to open source development tools -- already unstoppable -- continues to gain momentum. Years ago, open source was looked upon as a way to save money. Today, a key driver is the clear fact that, with tens of thousands of contributors sharing their expertise and the ever-widening availability of high-quality code, resistance is futile.

In this expert handbook, we explore the issues and trends in cloud development and provide tips on how developers can pick the right platform.

One gauge for measuring the growth of open source is how quickly container technology has been adopted. According to a January 2017 report from 451 Research, the global application container segment -- just one piece of the overall tools market -- reached $762 million in 2016 and is forecast to reach $2.7 billion in 2020. That's an impressive 40% compound rate over four years.

Yet, not all is well. A problem with open source components is that they are, well, open. They could come from anywhere, from anyone. How do they rate in terms of performance and security? It's the big unknown. In its 2017 open source security and risk analysis report, Black Duck Software noted its own audit found that open source components were present in 96% of applications it examined, with apps incorporating 147 unique components on average. And consider this scary finding: The financial services and financial technology sector had the highest number of vulnerabilities per application at 52. Fully 60% of those apps harbored high-risk vulnerabilities.

How well do you know open source development tools and components trends? Take this brief quiz, and see how well you measure up.

Joel Shore is news writer for TechTarget's Business Applications and Architecture Media Group. Write to him atjshore@techtarget.comor follow @JshoreTTon Twitter.

Red Hat exec explains Container Health Index

Most open source software has security holes

Build an open source security toolkit

Follow this link:
Monthly quiz: Test yourself on open source development tools trends - TechTarget

SKT Develops Hacking-Proof Core Chip for Quantum Cryptography – BusinessKorea


BusinessKorea
SKT Develops Hacking-Proof Core Chip for Quantum Cryptography
BusinessKorea
Key equipment was developed for the popularization of quantum cryptography known to be impossible to hack. SK Telecom announced on July 23 that it developed a prototype chip for generating ultra-small quantum random numbers. The product which was ...
SK Telecom develops 5mm QRNG chip prototype - TelecompaperTelecompaper (subscription)

all 5 news articles »

More here:
SKT Develops Hacking-Proof Core Chip for Quantum Cryptography - BusinessKorea

When thieves strike, cryptocurrency investors tremble – CBS News

Cryptocurrency Ethereum has emerged from the shadow of its better-known rival Bitcoin thanks to its skyrocketing price -- that has also made it a tempting target for hackers.

Thieves earlier this month stole $10 million from an electronic wallet provide by Coindash, a company that specializes in the kind of blockchain technology used in digital currencies. Another $32 million recently went missing after hackers exploited a vulnerability in an e-wallet from startup Parity.

The price of Ethereum slumped following news of the heists, tumbling more than 15 percent from $258.52 on July 18 to $218.82 on Friday, according to CoinMarket Cap.

Coindash, which was using a so-called initial coin offering to raise funds, plans to compensate victims of the hack. To help stabilize the price of Ethereum, it will also offer bonuses to anyone who holds it for at least six months. According to Parity, there were three accounts compromised in the attack and that the thief is attempting to launder the money through exchanges.

"If anything, it makes people more aware of the pitfalls of coding," said Luis Cuende, CEO of Aragon, an Ethereum-based corporate management tool, adding that the underlying code that powers the cryptocurrency wasn't affected by the attack.

The concept behind Ethereum was initially described by computer programmer Vitalik Buterin in 2013 based on his research on Bitcoin. A year later he joined forces with another programmer to create Ethereum, now the second-most popular cryptocurrency after Bitcoin.

New investors in Ethereum may not be aware of the risks of losing their funds to hackers, said Simon Yu, CEO of CakeCodes, which offers cryptocurrency rewards to computer game players. He said accounts should be secured with private keys whose combinations are known only to the account holders.

Cryptocurrencies have long been dogged by concerns about their security, particularly after the collapse of Bitcoin exchange Mt. Gox in 2014. The company's former CEO, Mark Karpales, is currently on trial in Japan, where the corporation was based, on embezzlement and data manipulation charges. Karpales has blamed the company's collapse on hackers.

South Korea's largest Ethereum and Bitcoin exchange was breached in late June in a theft estimated at 1.2 billion won ($1.07 million). A Pennsylvania man also recently confessed to stealing $40 million worth of Bitcoin.

Despite the risks, investors continue to have faith in digital currencies even as their prices fluctuate wildly. Ethereum, which started the year valued at $8.17, has in a matter of months soared 2,600 percent. Over the same period, Bitcoin prices have surged from $1,027 to $2,638, a gain of more than 150 percent.

The S&P 500, the stock market index most closely tracked by professional money managers, has this year posted a gain of 10.3 percent.

2017 CBS Interactive Inc.. All Rights Reserved.

Continue reading here:
When thieves strike, cryptocurrency investors tremble - CBS News

Decentralisation mooted for African cryptocurrency – IT-Online

While some sceptics may have misgivings about the technology, cryptocurrency and blockchain has disrupted financial services and will probably be around for a lot longer. This is the view of Heinrich Springhorn, business analyst at MobileData, who says: There is some instability due to a hearing in Japan regarding a bitcoin exchange that was shut down due to suspected embezzlement. However, this does not take away from the potential of what cryptocurrency, and essentially the blockchain, can mean to transacting worldwide. This realisation can make a real difference for operations in Africa, he says. MobileDatas standpoint is that to apply this methodology in Africa and transact more freely, companies must be willing to participate in a decentralised model of transacting. One of the biggest set-backs at the moment is that there are only a small number of stock and service providers worldwide that accept cryptocurrency such as Bitcoin, and it is still far away from becoming main stream, Springhorn says. If a cryptocurrency should become mainstream, the potential exists that it could cause instability in financial enterprises. The reason for this is that the banking institutions will lose their locus of control over currencies and consumers will transact outside of their control. The decentralised nature of cryptocurrency means the reality facing markets is that there is no intermediary with the power to limit any fraud or embezzlement. This means there is no way for the assets to be seized in these cases, Springhorn explains. The companys assessment of the market is that for widespread adoption of this model to occur in Africa it will require a mechanism for on-the-fly exchanging of the cryptocurrency to a value of the fiat money. This is on the basis that services and stock providers do not accept cryptocurrencies as payment. If the service and stock providers do accept cryptocurrency as payment, then the transaction engine used will write an entry into the decentralised ledger and the transaction will go through the blockchain. In addition, there are socio-economic concerns with regards to cryptocurrency, as many end-users do not have access to the technology needed to transact with cryptocurrency,Springhorn adds.

Link:
Decentralisation mooted for African cryptocurrency - IT-Online

New Zealand Reserve Bank Rejects Need for Expansive … – Bitcoin News (press release)

In recent statements addressing contemporary cyber threats, including those pertaining to cryptocurrency cyber crime such as ransomware, the New Zealand Reserve Bank has rejected calls for enhanced and intrusive regulations.

Also Read:New Zealand Exchange Bitnz Shuts Down Due to Banking Hostility

The New Zealand Reserve Bank has rejected calls for enhanced regulations designed to target contemporary cyber threats, including ransomware and other challenges associated with virtual currencies.

In a speech which has been published on the New Zealand Reserve Banks website, Reserve Bank representative Toby Fiennes articulates the banks position on contemporary cyber threats. The dynamic cyber environment means that organisations have to be nimble in their approach to cyber security focused on outcomes, rather than prescriptive compliance exercises.

The speech indicates recognition that the challenges posed by cryptocurrency will be dynamic, and that the threats posed by online crime cannot simply be regulated out of existence. The nature and incidence of cyber risk is unique, meaning that typical approaches to risk management and disaster recovery planning may not be appropriate. While cyber vulnerabilities can be mitigated, the potential sources of cyber threats and the attack footprint are just too broad, so they can never be eliminated.

Whilst recognizing the short term disruptive potential of contemporary fintech innovations like bitcoin, the New Zealand Reserve Bank also believes that these new technologies are likely to bring benefits to the financial system in the long term. The bank recommends against heavy-handed prescriptive regulations for cryptocurrency suggesting that legal guidelines for virtual currencies should be flexible, adaptive, and not restrict innovation. Looking forward, the Reserve Bank and other regulators will need to make sure the regulatory regime in New Zealand is adaptive should any new business models become systemic, while not unduly harming innovation.

The central bank also revealed that it is working in partnership with other government agencies including the Ministry of Business, Innovation, and Employment, and the Financial Markets Authority to ensure that New Zealand cultivates a regulatory climate that will encourage financial innovation within the digital sphere.

Do you agree with the reserve bank of New Zealands opinion that regulations designed to protect against cyber crime could harm innovation in new financial industries? Share your thoughts in the comments section below!

Images courtesy of Shutterstock

Whats the quickest way to see the current bitcoin price in your local currency? Click here for aninstant quote.

See the original post:
New Zealand Reserve Bank Rejects Need for Expansive ... - Bitcoin News (press release)

ECB President: Cryptocurrency Price Boom Having Limited Effect on Economy – CoinDesk

The president of the European Central Bank (ECB) has issued remarks addressing the rising interest in cryptocurrencies as an asset class.

In a letter to members of the European parliament this week, Mario Draghi built on statements made during a May hearing, in which he first discussed financial innovation, including the "rapid pace of development" in digital ledger(DLT) and related technologies. At the time, he cautioned that care must be taken so that fintech, including blockchain and DLT, does not disrupt the financial system.

Published this week, the new letter builds on this commentary, addressing more directly the rise in cryptocurrency prices so far in 2017. Driven by big gains in bitcoin and ether, the value of the total supply of all cryptocurrencies is now $93bn, down slightly from an all-time high of $115bn earlier this year.

Still, in the face of this increase, Draghi used the opportunity to restate his belief that cryptocurrencies still havea limited impact on the financial system.

Draghi wrote:

"Although the market capitalisation of [virtual currency schemes] has increased since the publication of these reports, there is no evidence to suggest that the connection of VCS to the real economy has strengthened significantly."

Citing past research from the ECB, Draghi indicated he still believes there could be a "build-up of risks" due to the use of cryptocurrencies, which may necessitate an international regulatory response.

Still, for now, he said the ECB would likely take steps to continue to monitor the ecosystem, tracking the "number, structure and scope" of public blockchain tokens.

"An increase in the usage of [virtual currency schemes] is conceivable. It is thus important to monitor the take-up of VCS from a financial stability perspective," he said.

For more on how the ECB is approaching blockchain and cryptocurrencies, read our most recent interview.

ECB DLT Lead: Central Banks Won't Compete on Blockchain Tech

Mario Draghi image via Shutterstock

The leader in blockchain news, CoinDesk is an independent media outlet that strives for the highest journalistic standards and abides by a strict set of editorial policies. Have breaking news or a story tip to send to our journalists? Contact us at [emailprotected].

Continue reading here:
ECB President: Cryptocurrency Price Boom Having Limited Effect on Economy - CoinDesk

MCU or DSP?: Graphics and Cryptography in Microchip’s New Microcontrollers – All About Circuits

The hardware inside microcontrollers is increasingly powerful and versatile. This is good, right?

When I started working with embedded systems, microcontrollers and DSPs were very different things. In fact, the first professional system that I was deeply involved in was a perfect example of the distinction: An 8051 microcontroller was used for housekeeping tasks and a test/debug RS-232 interface. A Texas Instruments DSP was used for intensive mathematical computations. The 8051 was programmed by a mechanical engineer, and the DSP was programmed by an electrical engineer who later became a system engineer. I dont know what this last sentence says about the MCU vs. DSP distinction, but maybe you can discover some hidden significance.

As microcontrollers become more powerful and incorporate additional dedicated hardware, the MCU and DSP categories become less relevant. Microchip is contributing to this trend with its PIC32MZ DA and CEC1702 microcontrollers, which incorporate advanced graphics capabilities and hardware cryptography, respectively. As one of the press releases points out, the PIC32MZ DA family breaks through perceived MCU graphics barriers. Just for the record, Im not making a value judgment here; you can call these parts whatever you want as far as Im concerned. When Im searching for a part I look at the specs, not the category, and I know which manufacturers make the processors that Im interested in.

However, as implied by the introduction to this article, I think it is worthwhile to consider the implications of microcontrollers that incorporate increasingly diverse and sophisticated functionality. There is always a trade-off: higher performance comes with design challenges such as stricter layout requirements, higher levels of firmware abstraction, or simply longer datasheets that are more intimidating for novices. There is perhaps some degree of risk in making microcontrollers increasingly unapproachable for those who dont have extensive experience in embedded design.

No one could deny that graphical displays or interfaces are essential aspects of modern electronic devices, and I assume that many designers will be glad to see manufacturers such as Microchip making efforts to support and improve this functionality. The PIC32MZ DA family includes a graphics controller, a graphics processing unit (GPU), and up to 32 MB of RAM.

Ive never had any need for encryption in my projects and I honestly know very little about it. But I readily believe that its important in these days of cybercriminals, identify theft, and shady business practices (shady business practices are nothing new, I supposeI doubt the Phoenicians attributed their success to fair trade). Microchip is emphasizing the importance of data security in the context of an IoT world, and that makes sense: if indeed the world will one day be filled with little Internet-connected devices sending data every which way, we might as well do what we can to protect that data from malefactors.

The CEC1702 is a 32-bit microcontroller built around an ARM Cortex-M4 processor. The special security features are described as encryption, authentication, and private and public key capabilities. As usual, this integrated functionality provides significant performance benefits by using hardware to accomplish tasks that otherwise would burden the processor; the product page mentions a factor-of-100 performance improvement for encryption and decryption.

In addition to typical encryption of data and code, the CEC1702 offers the following:

Do you have experience with complex embedded graphics applications? Do you think that the functionality offered by the PIC32MZ DA would be a significant advantage in the design process?

Read the original here:
MCU or DSP?: Graphics and Cryptography in Microchip's New Microcontrollers - All About Circuits

‘Risk’ Julian Assange Documentary: What Time & Channel Does It … – Heavy.com

Risk, thedocumentary about Julian Assange by Laura Poitras, is finally going to be shown on Showtime tonight. Poitras filmed Assange for six years. According to Huffington Post, Assange sent a cease-and-desist letter to try to stop the films initial release in May.

Heres the official synopsis for the movie:

In the new world order where a single keystroke can alter history, WikiLeaks founder Julian Assange is undeterred even as the legal jeopardy he faces threatens to undermine the organization he leads and fracture the movement he inspired. Capturing this story with unprecedented access, Academy Award winning director Laura Poitras finds herself caught between the motives and contradictions of Assange and his inner circle in a documentary portrait of power, betrayal, truth and sacrifice.

Read on below for more details about tonight and how to watch the documentary.

DATE:Tonight, Saturday, July 22, 2017

PREMIEREAIR TIME:9:00 p.m. Eastern/Pacific (8 p.m. Central). The movie may be shorter than you expect. It will air for a little over 90 minutes, ending at 10:35 p.m. Eastern. After the documentary airs, Showtime will immediately show an encore presentation.

TV CHANNEL:Showtime To find what channel Showtimeis on for you,click hereto go to TV Guides listings. Then change the Provider (right under TV Listings) to your local provider. Youll be able to scroll down to see what channel Showtime is on for you.

PREVIEW:Heres the official trailer for Risk by Laura Poitras:

Read more from the original source:
'Risk' Julian Assange Documentary: What Time & Channel Does It ... - Heavy.com

Two Huge Cryptocurrency Heists Cost Investors Millions – WIRED

It was the week that sent dark web markets scrambling. On Thursday, the feds confirmed earlier reports that they had taken down Alphabay , a dark web bazaar substantially larger than Silk Road ever was. They tacked on a surprising revelation though: Dutch police had a month earlier quietly seized control of the third-largest dark web market, Hansa, setting a trap for displaced Alphabay buyers and sellers. What a world!

While darknet drama dominated the headlines, plenty more transpired. IBM detailed a new mainframe system that can power 12 billion encrypted transactions per day. At the opposite end of the spectrum, it turns out Myspace allowed anyone to take over anyone else's account just by knowing their birthday. And a pervasive IoT vulnerability called "Devil's Ivy" could make millions of devicesmostly camerasinsecure. Also insecure, until a recent update? Segway MiniPro scooters, which researchers found could be taken over remotely with relative ease, inviting goofy danger. We also took a look at Android antivirus software, which gets a big fat "needs improvement" grade from researchers who tested nearly 60 apps against known malware.

In government security news, only one person at Trump's big voter fraud summit bothered to talk about the genuine issue of outdated voting machine equipment. The State Department will fold its cybersecurity operation into a bureaucratic backwoods, which, guys, maybe now is not the best time? And if you were wondering how hard it is to get the Department of Defense to send you over a million dollars in weapons , the answer is apparently "not very."

Finally, please watch this video and read this story about a robot that can crack a popular safe in 15 minutes . It's a delight, and the world needs more of those.

And theres more. Each Saturday we round up the news stories that we didnt break or cover in depth but that still deserve your attention. As always, click on the headlines to read the full story in each link posted. And stay safe out there.

Cryptocurrency thieves took off with nearly $40 million this week in ether. In the bigger of the two, hackers took 150,000 ether tokens (worth over $30 million) thanks to a since-patched bug in the digital wallets of a start-up called Parity. In the other, hackers redirected incoming investments in a crypto trading platform's "initial coin offering" from CoinDash, the intended recipient, to another website altogether. They managed to grab $7 million before CoinDash halted the sale. Cryptocurrency! It's cool, it's sort of anonymous, it's subject to fairly frequent, devastating thefts.

The Internet Bug Bounty plays an invaluable role in helping protect the internet, ensuring there are payouts for finding and helping fix bugs in free and open-source software. Remember Heartbleed ? That was an IBB payout. This week, Facebook, the Ford Foundation, and GitHub each donated $100,000 to the IBB, keeping its mission going and allowing it to expand into data processing and privacy technologies.

It wouldn't be a week in security without customer data leaking thanks to a poorly configured database or S3 bucket. This time the honor goes to Dow Jones, Wall Street Journal parent company, which exposed the names, addresses, account information, email addresses, and partial credit card information of at least 2.2 million customers and as many as four million. The lesson, as always, is to be a little more careful with how you store your digital stuff .

Remember that time hackers posted membership info of everyone with an account at Ashley Madison, the site for active and aspirational adulterers? Who could forget! Parent company Ruby Corp. will pay out over $11 million to impacted users in a settlement that also does not acknowledge any wrongdoing, presumably aside from the whole adultery thing.

Continue reading here:
Two Huge Cryptocurrency Heists Cost Investors Millions - WIRED