What’s the connection between cybercrime and cryptocurrencies? Perhaps it would suffice to say that the reasons for criminals adopting the cryptocoin are quite obvious. But when did this all start, and what fuels it and gets fueled in return? This blog will go over some of the historical reasons that connect cybercrime and cryptocurrency as well as exa
Since we last reported on a version of the ELF Linux/Mirai malware containing cryptocurrency coin-mining tools in April, the IBM X-Force has noticed a steep increase in the volume of coin central processing unit (CPU) mining tools used in cyberattacks, specifically those targeting enterprise networks.
According to IBM Managed Security Services (MSS) data,
by Kevin Y. Huang, Fernando Mercês and Lion Gu
With more households running smart devices that access the internet, the router is typically their only doorkeeper. And whether an end user has a laptop/desktop and router combo, or a miscellany of other devices connected to the network, the security risks are the same. Based on our research, home routers have b
A team of Illinois-based scientists have conducted a research to improve the Bitcoin mining process by 30 percent.
Bitcoin mining is becoming a process even more costly in terms of computational resources, but a team of Illinois-based researchers have conducted a study to speed up this process.
The group of scientists led by Indian Scientist Rakesh Kumar, an
Attackers were able to break into servers belonging to Bitcoin cloud-mining platform Cloudminr.io last week and harvest the site’s entire database. Now hackers are attempting to sell the information, which includes thousands of unencrypted usernames, email addresses, and passwords.Cloudminr, a Norwegian company that started last year, relies on process
Hey Everybody! Hard to believe we’ve done 26 of these already. Hope you’re having as much fun watching/listening to these as we are having while making them!
First and most importantly this week we HAD to cover Rowhammer. For those of you who haven’t heard, the latest research to come from some smart folks over at Google is pretty scary. T
Internet users that have recently installed or updated the popular BitTorrent client μTorrent 3.4.2 Build 28913 may have installed a Bitcoin miner.
Internet users that have recently installed or updated the popular BitTorrent client μTorrent 3.4.2 Build 28913 had a nasty surprise, the application, in fact, installed a Bitcoi
Howdy Partners! Hope you all are in full swing in the new year and taking names. I know for a fact that a ton of you are busy since every hotel in Santa Clara, Calif., was sold out this month just as Robert and I were trying to visit the mothership.
Anywho… we started this week’s HackerKast chatting about how our blog post of the North Korean We
This is a pretty interesting story, and an interesting use (or mis-use) of cloud resources. We’ve covered similar stuff before like the case when Yahoo! was Spreading Bitcoin Mining Botnet Malware Via Ads, and then more recently when the Pirated ‘Watch Dogs’ Game Made A Bitcoin Mining Botnet.But this time it’s not malware based, a pair of researc
Once touted as a single currency to rule them all, the peer-to-peer cryptocurrency known as Bitcoins have seen their reputation damaged by a number of high-profile examples of them being stolen, devalued, laundered, and used to illegal activities worldwide. While it could be argued that traditional currency has had its share of looters throughout
Till now, he have heard about “Bitcoin digital wallet hacked” or “Bitcoin website hacked”, but now a hacker has stolen cryptocurrency from mining pools and generated $83,000 in digital cash in more than four months by gaining access to a Canadian Internet provider.Bitcoin is a virtual currency that makes use of cryptography to create
Announce
Share high-quality web security related articles with you:)
Tools