Cryptojacking' hacker trend turns Canadians into cryptocurrency miners

Slides:



Advertisements
Similar presentations
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Advertisements

Departmental drop-in session. The Staff project has three main aims: 1.Provide a standard image for all Windows Machines 2.Consolidate user.
Secure SharePoint mobile connectivity
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Security Issues and Challenges in Cloud Computing
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
Staying Safe Online Keep your Information Secure.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
A Growing Threat Debbie Russ 1/28/2015. What is Ransomware? A type of malware which restricts access to the computer system that it infects, and demands.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Society & Computers PowerPoint
KASPERSKY INTERNET SECURITY multi-device  Average number of devices in households: 4.5  Consumer device diversity will continue to expand.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Computer Security Keeping you and your computer safe in the digital world.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Cosc 5/4765 NAC Network Access Control. What is NAC? The core concept: –Who you are should govern what you’re allowed to do on the network. Authentication.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
November 14, 2016 bit.ly/nercomp_defendingyourdata16
Windows Tutorial 5 Protecting Your Computer
Follow-up issues from the presentation on Anti-virus / Security software TD & SD have encountered problems with AVG, which also is not rated highly in.
Managing Windows Security
What they are and how to protect against them
Hacking Computer crime and cyber security.
Hotspot Shield Protect Your Online Identity
Identity theft vector of the electronic age
Common Methods Used to Commit Computer Crimes
Cryptocurrencies by.
People used to install software on their computers
Information Security.
Cyber Security & IT: What’s Next?
Cyber Security By: Pratik Gandhi.
Cryptocurrencies By Rui Sakurai and Shane Spears
Sharing on the Internet
What is Tapestry? An Online learning journal system.
How To Protect Your Computer From Virus Outbreak Malwarebytes Antivirus Support
Bitcoin Explained in 2 Minutes
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Computer Technology Notes 5
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
Zcash Mining – A Guide For Beginners. Zcash (also known as ZEC and seventeenth most valued cryptocurrency with market capitalization of $500 million)
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
Risk of the Internet At Home
Life skill presentation
Matthew Allen Comp 2903 October 28th 2010
Spyware. By: Katheryn L. Gaston.
Lesson 2: Epic Security Considerations
Is your computer being used against you while you sleep?
HOW DO I KEEP MY COMPUTER SAFE?
Top Ten Cyber Security Hygiene Tips
Computer Security.
Cyber Security Best Practices
Tom Murphy Chief Information Security Officer
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Security Trends and Threats Affecting Innovations in Technology
6. Application Software Security
Online Computer Security Tips For Parents
About Us Scanster is one of the leading IT security software company. Our Software's are well integrated system that simplify computer security management.
Cybersecurity Simplified: Ransomware
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Presentation transcript:

Cryptojacking' hacker trend turns Canadians into cryptocurrency miners Process is invisible, so people don't even know it's happening The Associated Press Posted: Mar 12, 2018 M salter: Palm Creek computer club ~ March 2018

"Cryptojacking" has been on the rise, with people not realizing their computers are being hijacked for mining cryptocurrency. Scores of Canadians dipped their toes into cryptocurrency mining in recent weeks — they just didn't realize it. A wave of so-called "cryptojacking" has been sweeping the internet, forcing unwitting web surfers into generating money for cybercriminals.

Hackers infect websites with malicious code that secretly conscripts visitors into an army of cryptocurrency miners. Cryptocurrency mining involves devoting a computer's processing power to solving a complicated mathematical problem with digital currency offered as a reward. The cryptojacking process is invisible and web surfers typically don't even realize anything is happening in the background, unless they hear their computer's fan kick in as the machine is forced to work at its full capacity. Once they leave the infected website, the cryptojacking stops. Computer security researcher Troy Mursch recently identified as many as 50,000 websites that had been compromised by the latest hacking trend and said cryptojacking is in its "gold rush" stage.

An incident last month also exposed just how large the problem is becoming. On a quiet Sunday morning with most IT workers at home with their families, the websites of the Information and Privacy Commissioner of Ontario, the Centre for Addiction and Mental Health, and the municipal websites of cities including Yellowknife and Oshawa, Ont., were among thousands that were hit with an attack linked to a third-party accessibility app called Browsealoud. More recently, the infected sites Mursch identified included thousands using the WordPress platform, which is favoured by bloggers and small businesses looking for an easy way to set up a web presence. Canadian mom-and-pop stores, wedding photographers and personal trainers were among those who had their websites turned into profit generators for hackers.

He added there is a possible risk of damage to an overworked device if it were to be left mining endlessly for an extended period of time. "There have been cases — more proof-of-concepts, but still — where in a lab people tested running a cryptominer at 100 per cent and after a certain amount of hours the device overheats and actually pops, the back popped out," Segura said. On Wednesday, Microsoft reported its Windows Defender Antivirus software had recently blocked attempts by hackers to embed cryptomining malware on nearly 500,000 computers in a single day, mostly in Russia, Turkey and Ukraine.