Car Hacking: More likely to be done by a mechanic than by a hacker
infosec

Car Hacking: More likely to be done by a mechanic than by a hacker

When we talk about car hacking, it comes to mind a hacker who gets remote access to the car system ...
Read More
infosec

Sri Lanka: Blocks access to social media

The government of Sri Lanka has temporarily blocked access to various social media services following deadly explosions that erupted ...
Read More
infosec tweaks

How to hack networks with Wi-Fi passwords

Probably you have a Wi-Fi network in your home or stay close to one (or more) that appears in ...
Read More
infosec tweaks

What is Social Engineering, what are its techniques and how to protect yourself?

Social Engineering is the term used for a wide range of malicious activities that are accomplished through human interactions. Uses the ...
Read More
infosec tweaks

Cryptocurrency: Ways to Enhance Your Privacy

Privacy and privacy on the internet are of great importance. It is not enough to take one or two measures to protect ...
Read More
Latest Posts

Check Point: iPhone is the target of crypto malware creators

Apple is becoming an increasing target of cryptomining attacks, and according to Check Point, these attacks increased by 400% in the last 2 weeks of September.

In a more recent report, Check Point's researchers say they are investigating why this sharp rise has occurred, as well as adding that cryptominers are the most popular malware for September. Coinhive continues to be the number one choice for malware creators.

Check point malware coinhive cryptoloot

The article reported that malware using Coinhive has infected 19% of organizations worldwide, while Dorkbot, a trojan that steals sensitive information with 7%, comes second.

Still, his main opponent Coinhive, also known as Cryptoloot, comes to third place in the ranking. Its function is identical to Coinhive, but it keeps a smaller percentage of Coinhive.

"Crypto mining continues to be the number one threat faced by organizations nowadays. The most interesting part of our research, however, was the sharp increase we observed on iPhone devices, as well as in macs using the Safari browser. These attacks do not use some new technique to infect their victims' systems, so we have not yet understood the reason why these systems are targeted. "

"Such attacks prove that workers' mobile devices are not properly protected, something that every organization should check. When each employee has critical information on their mobile device, it is important to be able to ensure their availability, integrity and confidentiality.

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *