Don’t be a Coinmining Zombie – Part 2: How Do You Protect Yourself from being Cryptojacked?

Safe behaviors to protect yourself from cryptojacking follow the familiar rules you should adhere to every day to protect yourself against viruses, worms, bots, and malware, including ransomware, which are typically pushed to you through phishing techniques and social engineering:     Strengthen your network device’s credentials (e.g., your router), to make it less open…
The post Don’t be a Coinmining Zombie – Part 2: How Do You Protect Yourself from being Cryptojacked? appeared first on . Read More HERE…

Read more

Don’t Be a Coinmining Zombie – Part 1: Getting Cryptojacked

When your computer or mobile device (and now, even your IoT device) is hijacked to secretly mine cryptocurrencies, it’s been cryptojacked and becomes a coinmining zombie. Its CPU, memory, disk, and power are enlisted in varying degrees in the service of the mining botnet, which labors on behalf of those who use it, with other…
The post Don’t Be a Coinmining Zombie – Part 1: Getting Cryptojacked appeared first on . Read More HERE…

Read more

Lenovo Finally Patches Ancient BlueBorne Bugs in Tab and Yoga Tablets

Lenovo patches several popular tablet models to protect against BlueBorne vulnerabilities first identified in September 2017. READ MORE HERE…

Read more