Stories by Steve McGregory, Ixia

Crypto-mining is the next ransomware

Hackers are opportunistic creatures. As device manufacturers continue to add more CPU cores and gigabytes of RAM to smartphones and tablets as well as enterprise-grade cloud servers, these devices will continue to be increasingly useful targets for botnets.

[]