now browsing by tag
Mining cryptocurrency used to require thousands of dollars worth of equipment to see any kind of meaningful return, but not anymore. Newer digital currencies like Monero, ByteCoin, and AEON have given would-be miners the ability to mine tokens right from their laptops. This might benefit small-time miners that want to get involved in the sector, but for every good thing online there are always people that figure out a way to use it for bad.
Hackers have begun using these tools to infect computers and websites to secretly mine cryptocurrencies. This emerging type of malware attack has been dubbed as “cryptojacking”, and it could cause your computer to overheat and crash. Luckily, spotting these hidden miners isn’t all that difficult.
Cryptojacking essentially hijacks your computer’s CPU power to mine. This means when you’re browsing the web, the malware is running in the background completely unbeknownst to you. There are a few types of this malware, and some run only when you visit a certain website and others can be maliciously installed on your computer. The best way to prevent this is by using antivirus software and adblockers.
If you’ve already been hit with this kind of malware, you’ll notice either your computer acting sluggish, getting warmer than usual, or its fan constantly spinning. If you aren’t running any kind of demanding software, like video games or video editing programs, this should be the first hint that your computer is working overtime.
If you’ve noticed your laptop acting up, it’s time to go check on what’s going on under the hood. Mac users can view a detailed breakdown of everything their computer is running by searching “Activity Monitor” and using the magnifying glass icon at the top-right of the screen. Windows users can simply hold down the Ctrl-Alt-Del keys to bring up “Task Manager.”
Both of these menus will display a graph of how much of your computer’s processing power is being used. Any massive spikes should be red flags. You’ll also see an ordered list of the programs using the most processing power at the moment. Before ending any of these programs be sure to research what they are, as you could be ending a crucial part of your operating system.
Both Tesla and the Los Angeles Times have had their sites infected by cryptojacking software. Companies with popular websites are the most at risk, as hackers can embed code onto their servers and use the CPU power of everyone who visits the site. But making it a habit to check on how your computer is running will ensure your device isn’t getting used to make someone else a crypto fortune.
The post How to #Know If Your #Slow #Computer Is #Secretly #Mining #Cryptocurrency appeared first on National Cyber Security Ventures.
View full post on National Cyber Security Ventures
The cyber security community is still reeling after the revelation of the KRACK security vulnerability that breaks down Wi-Fi encryption. Now it seems another Wi-Fi-based bug has also been discovered.
Presented at the global Pwn2Own hacking contest in Tokyo, a team of researchers demonstrated how a separate Wi-Fi bug could be exploited to gain entry to iPhones and install malicious apps on them without the owners knowledge.
The details of the threat haven’t been made public yet as Apple hasn’t had time to patch the flaw. It’s discovery was enough to net the Tencent Keen Security Lab the top prize of $110,000.
The hacking contest is set up and run by the Zero Day Initiative, which seeks to find vulnerabilities in popular products and services and alert the manufacturers in time.
According to the official event page , the Tencent Keen Security Lab team used “code exectution through a WiFi bug” to escalate “privileges to persist through a reboot.” Effectively breaking through an iPhone’s lock screen through a Wi-Fi network.
The flaw will be relayed to Apple which could offer a software patch to close the gap.
“Once we verify the research presented is a true 0-day exploit, we immediately disclose the vulnerability to the vendor, who then has 90 days to release a fix,” explains the Zero Day Institute.
“Representatives from Apple, Google, and Huawei are all here and able to ask questions of the researchers if needed.
“At the end of the disclosure deadline, if a vendor is unresponsive or unable to provide a reasonable statement as to why the vulnerability is not fixed, the ZDI will publish a limited advisory including mitigation in an effort to enable the defensive community to protect users.”
As ever, from a security standpoint it is always advisable to make sure your phone is running the latest OS version and you closely vet the permissions you give to certain apps.
View full post on National Cyber Security Ventures
SAN JOSE — A private elementary schoolteacher accused of secretly recording people in the bathroom of his home was charged Wednesday with three misdemeanors, according to the Santa Clara County District Attorney’s Office.
Authorities say the arrest Thursday of 31-year-old Andrew Donahue of Campbell was not related to his role as a teacher at Challenger School in San Jose. Donahue has been charged with three counts of taking photographs or filming someone who is in a bathroom or in a state of privacy, according to prosecutor Luis Ramos.
One of the alleged victims is a juvenile, according to authorities.
“He set up a camera in the bathroom and was keeping videotapes,” prosecutor Luis Ramos said.
The post South Bay teacher arrested for secretly recording people inside home bathroom appeared first on Parent Security Online.
View full post on Parent Security Online
Are you someone who’s always overly excited about anything that has to do with couples and romance? If so, you could actually be addicted to love! Red roses, hearts, and all things lovey-dovey; that’s what’s on your mind most of the time. Read More….
View full post on Dating Scams 101