The Latest in IT Security

CoinKrypt Malware Uses Phones to Mine for Litecoin, Casinocoin and Dogecoin


With virtual currencies becoming more and more valuable, cybercriminals are increasingly focusing their attention on hijacking devices and abusing them for mining operations. One example is the CoinKrypt malware analyzed by Lookout researchers. Experts have spotted CoinKrypt, which is designed to target Android devices, on some Spanish forums that offer pirated software. However, most of the infections appear to be in France. This piece of malware is simple, but it can be highly effic…

Comments are closed.


TUESDAY, JULY 23, 2019

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments

Social Networks