Security researchers discovered a sample of clipper malware that targeted Android users by lurking in the Google Play store.
Instead of seeking financial gains with ransom demands, threat actors are now aiming to steal central processing unit (CPU) and graphics processing unit (GPU) resources to facilitate cryptojacking.
A recent study found that more than half of organizations around the world experienced a cryptocurrency mining attack last month, a trend that will likely continue as the crypto gold rush gains steam.
The top network security trends for security professionals to monitor in 2018 include the evolution of AI, cryptocurrency crime, serverless apps, digital twins, the IoT and more.
Cybercriminals recently breached two popular cryptocurrency platforms to steal personal information and digital funds to the tune of $300,000.
As cryptocurrencies gain traction with banks and consumers, IT professionals must consider the cybersecurity implications of becoming a cashless society.
Ethereum, a system for decentralized applications that uses blockchain, has hit a rough patch. The company recently dealt with a distributed denial-of-service (DDoS) attack. Ethereum DDoS Attack Origins The DAO exchange suffered a recursive code...
Blockchain technology has become a hot trending topic within the computer world in the last couple years. There's more to it than just bitcoins.
Ethereum is an updated blockchain technology that could be well-suited for the IoT. But how does it work, and is it a capable solution?