cryptocurrency

Base layer protocols: Base layer protocols are the peer-to-peer networks which form the basis of the Decentralized application (dApp) web. These base protocols are typically blockchains with an associated cryptocurrency coin secured by a consensus protocol where participants in the network decide collectively on the addition of new blocks toRead More →

crypto

The researchers at a Israeli Cybersecurity firm recently found that Kingminer, a cryptojacking  malware is constantly upgrading it’s system to escape detection and increase chance of success. It will continue to update which will invariably make detection tougher. The malware’s prey are servers developed by Microsoft especially Internet Information ServicesRead More →

crypto

Cryptojacking schemes are getting more and more intricate by the day. It appears hackers are now disguising cryptocurrency mining malware and passing it off as legitimate Windows installation packages. Researchers say the malicious code, more commonly known as Coinminer, was specifically designed to fly under the radar. What makes theRead More →

crypto

Sophoslabs has published a report in which the company claims to have identified at least 25 Android apps published on the official Google Play store that contain script facilitating the ‘cryptojacking’ of users’ computing resources. 25 Apps Containing Mining Malware Identified on Google Play Store Sophoslabs claims to have discoveredRead More →