Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Monero
RIG EK covertly delivers cryptocurrency miners

Malware peddlers have been quick to react to the cryptocurrency boom and to take advantage of every possible way to make other people and organizations mine coins for them. …

Ledger Nano S
Hardware wallet security is no match for scammers’ ingenuity

It is often noted that hardware cryptocurrency wallets are one of the better options for keeping one’s private keys safe: they are not affected by malware, the private …

Wi-Fi
How to make public Wi-Fi users mine cryptocurrency for you

Covertly roping unsuspecting users’ machines into mining cryptocurrency is a dream for many aspiring cryptocurrency owners, and some of them set aside ethical …

botnet
PyCryptoMiner ropes Linux machines into Monero-mining botnet

A Linux-based botnet that has been flying under the radar has earned its master at least 158 Monero (currently valued around $63,000). The malware The botnet is based on a …

Google Chrome
How to keep your browser and devices safe from cryptojackers

Cryptojacking makes surfing the web similar to walking through a minefield: you never know when you might land on a booby-trapped site. Stealthy cryptocurrency mining scripts …

NiceHash
NiceHash suffers security breach, around $70 million in Bitcoin stolen

NiceHash, one of the most popular crypto-mining marketplaces, has apparently suffered a breach that resulted in the theft of the entire contents of the NiceHash Bitcoin …

DDoS
DDoS attackers increasingly targeting cryptocurrency exchanges

The extraordinary volatility of the price of bitcoin has spurred speculators to employ a wide variety of tricks to make it swing between extremes, so that they can take …

bitcoin
How secure are cryptocurrency mobile apps?

Are the mobile apps you’re using to store or handle your cryptocurrency stash, track the currencies’ price, or interact with cryptocurrency exchanges secure? …

SF
Stealthy in-browser cryptomining continues even after you close window

In-browser cryptocurrency mining is, in theory, a neat idea: make users’ computers “mine” Monero for website owners so they don’t have to bombard users …

hand
The Wild West of drive-by cryptocurrency mining

As more and more Coinhive clones continue popping up, chances of users’ CPU power being hijacked for cryptocurrency mining are rising. According to Malwarebytes’ …

Bitcoin
Have you heard about Bitcoin multipliers?

Professedly, they are services that multiply any Bitcoin amount you send them by several times, and return to you the total amount in a mere hours. How do they do that? …

Android
Cryptocurrency-mining script planted in apps on Google Play

Coinhive’s cryptocurrency-mining script has found its way into mobile apps offered on Google Play. Trend Micro researchers have spotted two apps that have been equipped …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools