Cryptojacking Attacks: Who’s Mining on Your Coin?

X-Force data revealed that while browser-based cryptojacking was increasingly popular through most of 2018, cryptomining malware made a resurgence at the end of 2018 and into Q1 2019.

The post Cryptojacking Attacks: Who’s Mining on Your Coin? appeared first on Security Intelligence.

Continue reading Cryptojacking Attacks: Who’s Mining on Your Coin?

Hackers Favorite CoinHive Cryptocurrency Mining Service Shutting Down

Coinhive, a notorious in-browser cryptocurrency mining service popular among cybercriminals, has announced that it will discontinue its services on March 8, 2019.

Regular readers of The Hacker News already know how Coinhive’s service helped cyber crim… Continue reading Hackers Favorite CoinHive Cryptocurrency Mining Service Shutting Down

Cryptojacking Rises 450 Percent as Cybercriminals Pivot From Ransomware to Stealthier Attacks

Cybercriminals made a lot of noise in 2017 with ransomware attacks like WannaCry and NotPetya, using an in-your-face approach to cyberattacks that netted them millions of dollars from victims. But new research from IBM X-Force, the threat intelligence, research and incident response arm of IBM Security, revealed that 2018 saw a rapid decline in ransomware […]

The post Cryptojacking Rises 450 Percent as Cybercriminals Pivot From Ransomware to Stealthier Attacks appeared first on Security Intelligence.

Continue reading Cryptojacking Rises 450 Percent as Cybercriminals Pivot From Ransomware to Stealthier Attacks

IBM X-Force Security Predictions for the 2019 Cybercrime Threat Landscape

IBM X-Force’s top security predictions for 2019 cover a range of potential attack schemes and consequences, from industry-specific prognostications to a rapid expansion of emerging criminal schemes.

The post IBM X-Force Security Predictions for the 2019 Cybercrime Threat Landscape appeared first on Security Intelligence.

Continue reading IBM X-Force Security Predictions for the 2019 Cybercrime Threat Landscape

iPhones Increasingly Targeted by Cryptomining Malware

iOS and macOS were long believed invincible but facts and statistics reveal another truth. According to a brand new research, there is a near 400% increase in cryptomining attacks against iPhones. This upsurge has been registered in the last two…Read… Continue reading iPhones Increasingly Targeted by Cryptomining Malware

Is Your Site Protected Against Drupal Security Flaws?

This past summer saw a pair of Drupal security flaws exposed and patched. Is your website secure?

The post Is Your Site Protected Against Drupal Security Flaws? appeared first on Security Intelligence.

Continue reading Is Your Site Protected Against Drupal Security Flaws?

National Cyber Security Awareness Month: What’s New for 2018?

To kick off October, we take a look back at what happened in cybersecurity in 2018 and a sneak peek at this year’s National Cyber Security Awareness Month.

The post National Cyber Security Awareness Month: What’s New for 2018? appeared first on Security Intelligence.

Continue reading National Cyber Security Awareness Month: What’s New for 2018?

Kodi Media Player Installations Used for Distributing Malware

A dangerous new hacking practice has been detected — the use of the of Kodi media player for distributing malware. A lot of users running the open-source software are at risk of becoming victims of a global cryptomining campaign according…Read … Continue reading Kodi Media Player Installations Used for Distributing Malware

Seven Ways to Protect Yourself against Cryptojacking

As netizens [citizens of the web – ], you probably know about computer viruses and hacking incidents. The new technology and market development have contributed to new forms of cyber-attacks and cryptojacking is one of them. These are often more…. Continue reading Seven Ways to Protect Yourself against Cryptojacking

Rocke Miner Removal — Identify and Delete Active Infections

Rocke Miner is a hacking weapon that can infect multiple hosts at once, our in-depth removal article shows how victims can remove active infections. Depending on its exact configuration it can perform various system changes and even deliver other infec… Continue reading Rocke Miner Removal — Identify and Delete Active Infections