Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Hackers do this by either getting the victim to click on a malicious link in an email that loads cryptomining code on the computer, or by infecting a website or online ad with JavaScript code that auto-executes once loaded in the victim’s browser.
Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.
Password-only authentication is dead. Combine passwords with multifactor authentication, social login, biometrics, or risk-based authentication to better protect users and your reputation.
Manufacturing giant GE takes a holistic approach to industrial internet of things (IIoT) security that integrates enterprise and product security. CISO Nasrin Rezai explains why this is important and how it works.
Among the the alarming trends highlighted in a new study from The Internet Society (ISOC) are the rise of state-sponsored cyber attacks as the internet is becoming increasingly intertwined with national security and the creation of “security divides” where some entities won’t be capable of dealing properly with threats.
Corey Thomas sees siloed operations as a root cause of security vulnerabilities and a barrier to innovation and better user experience.
Two new reports show big differences in risk among public, private, and hybrid cloud deployments. Here’s advice on the tools, information, and organizational structure needed to execute a successful cloud security strategy.