The Latest in IT Security

Posts Tagged ‘affected systems’

It seems like Bitcoin is gaining popularity not only in the computing industry, but in the threat landscape as well.We’ve recently reported a couple of attacks involving malware that installs a Bitcoin mining application into affected systems. Apart from turning systems into unwilling “miners”, such malware also disrupt usage, since the mining process takes up […]

Read more ...

Trend Micro recently came across a botnet that turns an infected system into an involuntary Bitcoin miner. Bitcoin is a digital currency that uses peer-to-peer (P2P) networks to track and verify transactions. Bitcoins are generated by a free Bitcoin miner application.The malware detected as BKDR_BTMINE.MNR installs the mining software onto affected systems. It uses the […]

Read more ...

The KOOBFACE botnet became known for using popular social network sites as vector for propagation and abusing these platforms for malicious purposes. Currently, it has been observed that KOOBFACE does not actively propagate via social networks, but rather propagates via a torrent peer-to-peer network through Trojanized shared application files.Based on our research, we found a […]

Read more ...


Categories

SATURDAY, MAY 04, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments