Cryptocurrencies have undoubtedly changed the world of finance by providing a secure and decentralized alternative to conventional currencies. Cryptocurrencies operate via a distributed ledg… Read More
The growing prominence of cryptojacking hackers targeting Linux-based systems and IoT devices was noted in the latest blog post released by Microsoft. The report highlighted how these actors… Read More
Introduction
Cryptojacking initially gained attention in September 2017. At the same time, Bitcoin prices were increasing. When bitcoin reached an all-time high in the latter months of 2017… Read More
Over time, the growing crypto space has regrettably become vulnerable and open to varieties of cyber attacks and malware. As the industry continues to witness massive expansion, its cyber at… Read More
Coinhive, a crypto exchange with a ne’er-do-well reputation and based out of Germany, has announced that it will be shutting its doors this week. Its Monero mining script will no longe… Read More
Security researchers at Sucuri discovered that more than 2,000 WordPress websites are infected with malware that logs passwords and just about anything else an administrator or visitor typ… Read More
To understand the mechanism of cryptojacking and how to prevent it, let’s take a look at the following topics.
What is Cryptojacking?Types of CryptojackingFile-based CryptojackingBr… Read More
Note: This article has affiliate links.
Do you own a computer or a mobile phone? If you use your devices to access the internet, they are vulnerable to malware infections. One way you can… Read More
Researchers have detected a campaign in which compromised docker hosts use Shodan for carrying out cryptocurrency mining.
Hackers scan for Docker hosts with exposed APIs and use them for cry… Read More
For a while ransomware was the talk of the town as scammers and hackers took to exploiting users using this undetectable atrocity. Now, they have resorted to using cryptojacking once again a… Read More
There is a shift in trend, warned cybersecurity unit Kaspersky Labs.
Previously, hackers have managed to control massive networks of botnets consisting of compromised computers and device… Read More
Public WiFi is great if you’re in a foreign country and have no access to the internet, or if you’re out and don’t want to tether your phone to your laptop. Unfortunately p… Read More
Welcome back to our tour of the cryptocurrency landscape. In the last post, we discovered Ether (and by relationship, Ethereum). Ether is the “digital oil” that fuels… Read More