Search
Hackers Infect 50,000 Servers With Sophisticated Crypto Mining Malware
3.6.2019
Hackers have breached over 50,000 servers across the world to mine cryptocurrency using unusually sophisticated tools, according to a new report
Hodler’s Digest, May 27–June 2: Top Stories, Price Movements, Quotes and FUD of the Week
3.6.2019
U.S. sanctions may have led North Korea to turn to crypto hacking, while Kik has launched a $5 million Defend Crypto campaign
‘Free Bitcoin’ Scam Propagated on YouTube Steals Crypto via Clipboard Hijacking
29.5.2019
Researchers have discovered a crypto address-stealing trojan that is hidden in the guise of a bitcoin scheme on YouTube
Researchers Say 50,000 Servers Worldwide Infected With Privacy Coin Cryptojacking Malware
29.5.2019
As many as 50,000 servers worldwide have allegedly been infected with an advanced cryptojacking malware that mines privacy-focused cryptocurrency turtlecoin
App Offering Free Bitcoin and Ether to Users Is a Scam, Malware Hunter Warns
27.5.2019
An app that claims to give users the chance to earn $45 a day in free bitcoin is a scam, a security researcher has warned
Hackers Behind Baltimore City Ransomware Attack Demand 13 Bitcoins, So Are Cryptocurrencies For Criminals?
24.5.2019
Ransomware attacks are the worst nightmares of an any organization’s cybersecurity, and more so in the case of administration. The recent Ransomware attack Baltimore City named RobbinHood has once again proved that cybercriminals are more than a step ahead of the authorities. The hackers have...
Fake Crypto Wallet App Imitating Trezor Found on Google Play Store
23.5.2019
Fraudsters have been adding fake crypto wallets to the Google Play store in an attempt to cash in on rising bitcoin prices
Crypto Miners Dominate Top 10 List of Most Prolific Malware Threats
16.5.2019
A global threat report has concluded that the three most common malware variants detected in April were crypto miners
Cybercriminals Sneak in Crypto Mining Malware via Confluence Software Exploit
7.5.2019
Cybercriminals are exploiting a known vulnerability in the software Confluence to mine XMR
Report Shows Cryptojacking Is Prime Example of Shift Towards Discreet Cyberattacks
14.3.2019
Cybercriminals are reportedly favoring “low and slow” approaches in attacks made for financial gains, and cryptojacking is a prime example of this shift, the report notes
Mining Malware Developer Settles with Federal Trade Commission
29.6.2015
A cryptocurrency mining malware developer has settled with the US Federal Trade Commission (FTC) and the New Jersey Attorney General's Office
Make Your Own Cash, 1930s Style; the CoinSummit Boosters; and Hot Pockets
30.3.2014
John Law remembers a 1930s currency revolution, survives exuberant optimism, and (almost) finds something good about mobile malware mining