News
17 Feb 2026, 13:50
Geopolitical Tensions and AI Fears Push Crypto and US Markets Lower

Bitcoin held steady as US and Iran talks ended; volatility is expected with further developments. US technology stocks slumped due to renewed artificial intelligence worries and geopolitical tension. Continue Reading: Geopolitical Tensions and AI Fears Push Crypto and US Markets Lower The post Geopolitical Tensions and AI Fears Push Crypto and US Markets Lower appeared first on COINTURK NEWS .
17 Feb 2026, 04:35
Hardware Wallet Phishing: Alarming Mail Attacks Target Trezor and Ledger Users Again

BitcoinWorld Hardware Wallet Phishing: Alarming Mail Attacks Target Trezor and Ledger Users Again In a stark reminder of persistent digital threats, a sophisticated mail phishing campaign has resurfaced, directly targeting users of Trezor and Ledger hardware wallets. This alarming trend, confirmed by security researchers in February 2025, exploits historical data breaches to launch highly personalized attacks designed to steal the foundational keys to cryptocurrency fortunes. Consequently, the crypto community must remain vigilant against these deceptive tactics that bypass digital filters and arrive physically at one’s doorstep. Hardware Wallet Phishing: Anatomy of a Resurgent Threat The recent campaign employs a classic yet effective social engineering strategy. Security expert Dmitry Smilyanets publicly detailed receiving a physical letter that perfectly impersonated the Trezor brand. The document urgently demanded an “Authentication Check,” pressuring the recipient to scan an embedded QR code. Importantly, this code did not lead to a legitimate site. Instead, it redirected to a meticulously crafted phishing page masquerading as an official Trezor or Ledger web interface. The sole objective of this fraudulent page is to harvest a user’s seed recovery phrase—the master key that controls all assets stored within the wallet. Both Trezor and Ledger have issued unequivocal warnings for years. They emphasize a critical, non-negotiable rule: their companies will never, under any circumstances, ask a user for their seed phrase . Any communication requesting this information is definitively a scam. This attack vector is particularly insidious because it leverages a breach of trust at the physical layer, making it feel more official than a standard email phishing attempt. The Root Cause: Exploiting Historical Data Breaches These targeted mail attacks are not random. They are possible due to past security incidents at both hardware wallet manufacturers that exposed sensitive customer information. Specifically, these breaches compromised databases containing customer names, email addresses, and—most crucially for this attack— physical mailing addresses . With this data in hand, malicious actors can orchestrate highly convincing, personalized phishing campaigns sent via traditional postal services. For context, Trezor disclosed in January 2024 that a contact list of approximately 66,000 customers had been compromised. While the company stated no funds were directly at risk from the breach alone, it explicitly warned that the exposed data could be used for precisely this type of phishing attack. Similarly, Ledger experienced a significant data breach in 2020, where a vast customer database was leaked. The resurfacing of mail-based phishing indicates that this stolen data remains actively in circulation and is being weaponized by cybercriminals. Expert Analysis on the Attack Methodology Security analysts break down the attack’s effectiveness into several key components. First, the use of physical mail bypasses many automated email security filters that users and companies rely on. Second, the inclusion of a QR code adds a layer of obfuscation; a user cannot easily hover over a QR code to preview the destination URL as they might with a hyperlink in an email. Third, the sense of urgency created by terms like “Authentication Check” or “Security Verification” pressures individuals into acting quickly, often bypassing their normal critical thinking. Furthermore, the phishing sites themselves are often convincing clones of legitimate wallet management pages. They may use correct logos, familiar color schemes, and similar wording. The only deviation is the ultimate request: the input of the 12, 18, or 24-word recovery seed phrase. Once a user enters this phrase, attackers gain complete and irreversible control over the associated cryptocurrency wallet and all its contents. Comparative Security Postures of Trezor and Ledger While both companies are targets of the same phishing campaign, their underlying security architectures and historical breach responses offer points of comparison. The table below outlines key distinctions relevant to user security. Aspect Trezor (Model T/One) Ledger (Nano X/S) Primary Architecture Open-source firmware and hardware Closed-source, proprietary Secure Element chip Past Major Data Breach Jan 2024 (66k contact details) July 2020 (1M+ email addresses, details) Physical Attack Resistance Vulnerable to certain physical exploits if device is stolen Designed to be highly resistant to physical tampering User Communication on Phishing Consistently advises never to share seed phrase; warnings on blog & support Identical core rule; runs ongoing “Don’t Trust, Verify” education campaigns It is vital to understand that no hardware wallet is immune to user error . The strongest cryptographic security in the world can be undone if a user voluntarily gives their seed phrase to a third party, regardless of the brand they use. Therefore, the primary defense layer rests with the individual’s knowledge and caution. Proactive Measures for Hardware Wallet Users Users can and must take concrete steps to protect themselves from these and similar phishing attacks. Implementing the following security hygiene practices creates a robust defensive barrier. Treat Your Seed Phrase as Sacred: Never type it into any website, computer, or phone. Never share it with anyone. It should only be used to recover your hardware wallet on the genuine device itself. Verify Communications Independently: If you receive any suspicious communication, do not use contact details provided in the message. Instead, navigate directly to the official company website through your own bookmarks or search to contact support. Be Wary of QR Codes: Exercise extreme caution when scanning QR codes from unsolicited physical mail. Consider using a QR code scanner app that previews the URL before opening it. Use a Passphrase (Advanced): For additional security, consider using the optional passphrase feature (often called a “25th word”) offered by both Trezor and Ledger. This creates a hidden wallet, adding an extra layer of security even if your physical seed phrase backup is discovered. Stay Informed: Follow the official security blogs and announcements from your hardware wallet provider. They are the primary source for truth regarding new threats and scams. Conclusion The resurfacing of mail phishing attacks targeting Trezor and Ledger users underscores a timeless principle in cryptocurrency security: the human element is often the weakest link. While hardware wallets provide unparalleled protection against remote hacking, they cannot prevent users from being tricked into surrendering their keys. The persistence of these campaigns, fueled by old data breaches, serves as a critical reminder. Ultimate security rests on unwavering skepticism, independent verification, and the ironclad rule of never divulging your seed phrase. By adhering to these practices, users can confidently navigate the landscape and keep their digital assets secure against even the most personalized hardware wallet phishing attempts. FAQs Q1: What should I do if I receive a suspicious letter about my Trezor or Ledger? A1: Do not scan any QR codes or visit any links. Destroy the letter. Report the incident directly to the official support team of your wallet manufacturer by visiting their website through a trusted bookmark. Q2: I scanned the QR code but didn’t enter my seed phrase. Am I at risk? A2: Simply visiting a phishing website is generally low risk if you did not input any information. However, clear your browser cache and ensure your device has updated antivirus software. Remain vigilant for any further suspicious activity. Q3: How can attackers send me physical mail? A3: This is possible due to historical data breaches at Trezor and Ledger where customer mailing addresses were exposed. This stolen data is now being used to conduct targeted, geographically-aware phishing campaigns. Q4: If my seed phrase is compromised, what are the immediate steps? A4: If you have entered your seed phrase anywhere online, you must immediately move all funds to a new, secure wallet with a newly generated seed phrase. The old seed phrase and all wallets derived from it are now considered permanently compromised. Q5: Are newer hardware wallet models immune to these phishing attacks? A5: No. Phishing attacks target the user, not the device. Even the latest and most secure hardware wallet model cannot protect you if you voluntarily give away your recovery phrase. User education is the only effective defense. This post Hardware Wallet Phishing: Alarming Mail Attacks Target Trezor and Ledger Users Again first appeared on BitcoinWorld .
17 Feb 2026, 04:27
Wallet Founder Warns of Coordinated Scam Targeting XRPL Users

Xaman Wallet founder Wietse Wind has said that a “massive XRPL targeted scam effort” is underway, warning users about fake sign requests, phishing emails, and impersonation accounts. His alert points to a rise in social engineering attacks aimed at crypto holders rather than flaws in the blockchain code. A Multi-Pronged Attack on XRPL Users Wind wrote on X on February 16 that he had spent the weekend adding new filters and alerts to Xaman Wallet after detecting coordinated attempts to trick users into signing malicious transactions. He listed several methods seen in recent days, including scam NFTs that promise token swaps, fake desktop wallet apps, and direct messages posing as support staff. The official wallet account repeated the warning, telling users not to click links, respond to DMs, or connect wallets to unknown websites. According to Wind, the attacks usually focus on manipulating users rather than breaching software, with the scammers expanding beyond social media and sending phishing emails even though Xaman does not store user email addresses, suggesting attackers are relying on leaked data from unrelated breaches. The tricksters are also reportedly promoting fake “desktop wallets,” despite Xaman being a strictly mobile application. Some fraudulent projects are even promising free tokens in exchange for users’ secret keys. Wind stressed that funds will stay safe if people avoid approving unknown transactions or sharing their keys. “No matter the amount of warnings, detection, filtering, alerts in the app and here on social: no scammer can get you if you don’t willingly / unknowingly interact with them,” he advised. “Your funds are perfectly safe in Xaman Wallet: just don’t sign any transaction you don’t trust, and don’t interact with anyone promising you free tokens.” Scams Moving Beyond DeFi Exploits The XRPL scam wave reflects a troubling industry-wide trend, with a PeckShield report from earlier in the year revealing that crypto scams and hacks drained more than $4.04 billion in 2025. Of that total, $1.37 billion came from scams alone, a 64% increase from 2024. The firm said attackers are shifting toward tailored phishing campaigns that target individuals with large holdings instead of relying only on technical exploits. Furthermore, the PeckShield report also found that centralized platforms and companies accounted for about 75% of stolen funds last year, up from 46% in 2024. These high-value thefts tied to deception extend beyond software wallets. On January 17, 2026, blockchain investigator ZachXBT reported that a victim lost about $282 million in Bitcoin (BTC) and Litecoin (LTC) through a hardware wallet scam. According to his findings, the attacker later moved the funds through THORChain and converted them to Monero (XMR). Wind’s posts framed the latest campaign as a reminder that wallet security often depends on user decisions. “This is a cat and mouse ‘game,’ and the scammers will not win,” he stated. The post Wallet Founder Warns of Coordinated Scam Targeting XRPL Users appeared first on CryptoPotato .
16 Feb 2026, 22:56
Bytedance responds to Disney pressure, commits to tackle IP infringement

ByteDance, TikTok’s parent company, has come under legal fire for allegedly allowing users of its platform to create videos featuring copyrighted characters. Disney and the Motion Picture Association (MPA) have accused ByteDance of using copyrighted work to train its AI, Seedance 2.0. The company has promised to strengthen its current safeguards and prevent the use of unauthorized content by its users. ByteDance under fire for AI copyright infringement ByteDance, the Chinese technology giant that owns TikTok, launched Seedance 2.0, a new artificial intelligence (AI) video-generation tool on February 12, 2026. The tool quickly went viral for its ability to create hyper-realistic videos from simple text prompts, but it appears to allow users to generate videos featuring copyrighted characters and famous actors without any licensing agreements. Disney sent a cease-and-desist letter to ByteDance on Friday, accusing the company of conducting a “virtual smash-and-grab” of their intellectual property. The company alleged that Seedance was prepackaged with a pirated library of characters, making them available to users as if they were public-domain clip art. Social media users have already shared clips generated by the tool showing very popular movie scenes, such as Spider-Man fighting Captain America and Star Wars characters Anakin Skywalker and Rey engaging in lightsaber battles. The Chairman of the Motion Picture Association (MPA), which represents major studios including Netflix, Universal, and Warner Bros.Discovery, and its CEO Charles Rivkin, stated that Seedance 2.0 engaged in “unauthorized use of U.S. copyrighted works on a massive scale” within a single day of its release. The Japanese government also launched an investigation into ByteDance after AI-generated videos of popular anime characters appeared online. Japan has historically maintained strict copyright laws to protect its multi-billion dollar anime industry. Can ByteDance fix its copyright issues? CNBC and the BBC report that a ByteDance spokesperson said that the company respects intellectual property rights and is listening to the concerns raised. “We are taking steps to strengthen current safeguards as we work to prevent the unauthorized use of intellectual property and likeness by users,” the spokesperson said. Currently, ByteDance has not provided details on how its planned safeguards will work, but the company claims it has already paused the ability for users to upload images of real people to the platform. Despite this, the tool continues to produce likenesses of celebrities. For example, Reuters reported that videos of Tom Cruise and Brad Pitt in a fight have been circulating in China. These “deepfake” style videos raise additional concerns for SAG-AFTRA, the union representing Hollywood actors. It has so far accused ByteDance of “blatant infringement” regarding the digital likenesses of its members. Part of the complaints is that ByteDance has remained silent on what information Seedance 2.0 was trained on to generate its videos, unlike some Western AI companies that have begun disclosing their data sources. Critics argue that the tool’s ability to perfectly replicate characters like Darth Vader suggests that the AI was trained directly on copyrighted films and television shows. Despite Disney’s legal fight with ByteDance, in late 2025, it signed a landmark $1 billion licensing deal with OpenAI to legally use 200 characters from Disney’s Pixar, Marvel, and Star Wars franchises to train its models. Disney’s fight seems to not be against the use of AI technology itself, but rather against the unauthorized use of its assets. The company also sued Midjourney and sent warnings to Character.AI in September 2025, demanding the removal of unauthorized chatbots based on its characters. Don’t just read crypto news. Understand it. Subscribe to our newsletter. It's free .
16 Feb 2026, 22:49
NVIDIA new chips to cut costs by 35x as coding tools grab half of AI related searches

div]:bg-bg-000/50 [&_pre>div]:border-0.5 [&_pre>div]:border-border-400 [&_.ignore-pre-bg>div]:bg-transparent [&_.standard-markdown_:is(p,blockquote,h1,h2,h3,h4,h5,h6)]:pl-2 [&_.standard-markdown_:is(p,blockquote,ul,ol,h1,h2,h3,h4,h5,h6)]:pr-8 [&_.progressive-markdown_:is(p,blockquote,h1,h2,h3,h4,h5,h6)]:pl-2 [&_.progressive-markdown_:is(p,blockquote,ul,ol,h1,h2,h3,h4,h5,h6)]:pr-8"> _*]:min-w-0 gap-3 standard-markdown"> NVIDIA just put out on its newest GB300 NVL72 systems. They can handle 50 times more work per megawatt of electricity compared to the older Hopper platform. That means costs drop by 35 times for each piece of information processed. Signal65 did separate testing on the GB200 NVL72 and found it processes more than 10 times the information per watt, cutting costs to a tenth of what they were. The improvements keep coming. NVIDIA’s TensorRT-LLM library upgrades alone gave the GB200 a five-times performance boost in just four months for tasks needing instant responses. Teams working on Dynamo, Mooncake and SGLang tools are pushing efficiency even higher. These AI tools break down if there’s lag time or they can’t remember enough context. Companies need them to actually work in real business situations, not just demos. Artificial intelligence tools that write code and work as digital helpers now account for nearly half of all AI-related searches, up from just 11% a year ago. The numbers come from OpenRouter’s State of Inference report and show how fast things are changing in this space. This sudden jump has companies scrambling to build hardware that can keep up. These AI assistants need to respond right away and remember context from entire software projects, which puts serious demands on computing power. _*]:min-w-0 gap-3"> Market explosion fuels tech giants’ battle for dominance The money involved is huge. The AI agent market was worth 4.92 billion dollars in 2024. Estimates put it at 6.016 billion dollars for 2025, then ballooning to 44.97 billion dollars by 2035. That’s 22.28% growth every year for the next decade. Banks, hospitals, stores and factories are the early adopters. Businesses are putting these agents into customer management systems, planning tools and security setups to save money and get more done. What started as optional tech is becoming basic infrastructure. As reported by Cryptopolitan, Alibaba just launched Qwen3.5 targeting China’s market, claiming 60% lower processing costs than before. The model can look at screens and do tasks across phones and computers. It’s going head-to-head with ByteDance’s Doubao app, and there’s a DeepSeek update coming too. OpenAI hired Peter Steinberger on the 15th. He built OpenClaw , an open-source AI agent. CEO Sam Altman said Steinberger will lead work on next-generation personal agents and called him a genius with great ideas about smart assistants that can get useful stuff done. The talent crisis nobody can solve 94% of business leaders say they’re short on AI skills. By 2028, 44% expect to still have 20 to 40% shortages. Workera says these gaps could cost the global economy 5.5 trillion dollars in 2026 from delayed products, quality issues and lost sales. Right now demand for AI talent beats supply 3.2 to one worldwide. AI jobs pay 67% more than regular software positions. Yet 85% of office workers are learning about this stuff on their own time, and 83% say they’re mostly teaching themselves instead of getting formal training. When companies buy AI tools from specialized vendors, they succeed 67% of the time. Internal builds only work about a third as often. Salesforce saw 119% agent growth in early 2025 and crossed 500 million dollars in recurring revenue for these products. They added 6,000 enterprise customers in three months. Businesses will probably buy solutions instead of building them. That points to the market concentrating around a few big players who can deliver what actually works. If you're reading this, you’re already ahead. Stay there with our newsletter .
16 Feb 2026, 20:15
Cardano's founder Hoskinson wants Facebook and Tinder on blockchain to onboard billions of users

Charles Hoskinson, a co-founder of Cardano, hopes to expand blockchain technology beyond the financial industry and into commonplace applications, potentially reaching billions of users on Facebook and Tinder. Hoskinson said at the Consensus Hong Kong 2026 that dating apps could use blockchain to help users verify personal details like their salary, location, and height. By verifying that profile pictures are authentic, the technology may also lessen the prevalence of catfishing and phony accounts. By integrating it into routine digital experiences, Hoskinson hopes to increase the transparency and reliability of online interactions. Vision extends beyond financial applications “I want to get to a point where video games are on it, a point where Facebook and other things run on this infrastructure,” Hoskinson said at the event. “That’s what’s going to bring 2-3 billion people in and that’s what’s going to change everything.” Building on this goal, Hoskinson criticizes the industry’s current direction , pushing for a more user-friendly approach. The co-founder of Cardano feels that financial goods have received too much attention in the blockchain industry. He wants consumers to have seamless experiences without having to know how the technology works. “I don’t have to care how electricity works. I just flip the switch and magically it works,” he said, comparing it to electricity. “We have got to do that as an industry and stop ‘overfinancializing’ everything.” Such a shift toward invisible, everyday utility becomes especially relevant given the ongoing challenges users face on traditional platforms. His comments align with growing concerns about social media fraud and privacy. Data misuse on centralized platforms and catfishing could be addressed by blockchain technology. Hoskinson also highlighted another key upcoming development in Cardano’s ecosystem that supports privacy for mainstream users. Hoskinson discussed Cardano’s planned Midnight partner chain debut in late March. With this privacy-focused functionality, users of existing privacy currencies like Monero or Zcash will not be targeted. “You don’t try to get anybody from Monero or ZCash over,” he said. Through practical applications, the team plans to focus on everyday users. Despite the excitement created by these long-term goals, Cardano’s native coin, ADA, has seen short-term volatility. The ADA token performs inconsistently Over the past few days in mid-February 2026, price movements have reflected this ongoing uncertainty. Since mid-February 2026, Cardano’s ADA token has been acting strangely. Its closing price on February 16 was $0.285681, which was less than $0.295266 on February 14 but higher than $0.281780 on February 15. ADA fell earlier on February 13 to $0.272692. These fluctuations persist even as the network continues its methodical upgrades. Network improvements have yet to overcome strong opposition. Unlike markets that value speed, Cardano approaches innovation with purpose. At the same time, several recent advancements are helping to generate some renewed momentum. If market circumstances improve, more liquidity may be available through the LayerZero cross-chain link and the upcoming USDCx stablecoin launch. Failure to break through would test lower support at $0.24 to $0.26 or further sideways volatility. Forecasts suggest ADA may soon reach $0.30, with monthly highs of about $0.324 possible. Through examination, mixed signals are discovered. Cardano is still declining but stabilized after a recent jump linked to cross-chain activities. Profit-taking prompted a test of significant long-term support at $0.244 after a brief increase close to $0.30. ADA seems to be in survival mode at $0.2800 , with recent dips attributed to a drop in retail demand. Despite obstacles, some signs suggest bigger players are more confident. Major investors have shown confidence. Recent purchases of 220 million ADA by major investors may aid in a recovery if $0.271 holds and $0.303 breaks. Regulated markets have also increased institutional interest. Cardano’s enormous market value makes significant price adjustments difficult. ADA would require billions of dollars in new investment funds to increase from $0.26 to $1. These factors contribute to a hopeful near-term outlook. In the end, Hoskinson’s ambitious plan aims to transcend existing market conditions. By making blockchain technology accessible to billions of regular people, Hoskinson’s approach signals a larger movement away from finance and toward real-world applications. Sharpen your strategy with mentorship + daily ideas - 30 days free access to our trading program








































