One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 487281
Date de publication 2018-02-21 14:00:00 (vue: 2018-02-21 14:00:00)
Titre Crypto-Miners: What Are They and What Steps You Can Take to Protect Yourself
Texte Bitcoin's value grew significantly in 2017. At the beginning of the year, a single Bitcoin was worth less than $1000. By year's end, its price had grown to over $13,000. That's after peaking at $19,086.84 on 19 December. Such growth didn't go unnoticed by digital attackers or by organizations looking to supplement their online advertising revenue. Both responded by deploying crypto-miners. These tools help generate money for domain owners, yet they oftentimes have negative consequences for unsuspecting users exposed to them. To better understand the growing threat of crypto-miners, let's take a look at how crypto-mining works in general, how bad actors are abusing them to take advantage of ordinary people, and how users can protect themselves. What Are Crypto-Miners? Crypto-miners are tools that "mine," or generate, new units of a cryptocurrency like Bitcoin. They do so by completing mathematical puzzles that constitute what Hacker Noon's Chris Herd calls "proof of work calculations" for the new units. The process of mining doesn't just generate cryptocurrency; it also adds, secures, and verifies transactions to the blockchain. A deeper dive into how cryptocurrencies work is necessary to better understand crypto-miners. Digital currency like Bitcoin runs on the blockchain, a ledger of transactions which is distributed across the entire community of users who own units of that cryptocurrency. Benzinga staff writer Shanthi Rexaline explains it's here where mining comes into play: Every single transaction made and the ownership of every single cryptocurrency in circulation is recorded in the blockchain. The blockchain is run by miners, who use powerful computers that tally the transactions. Their function is to update each time a transaction is made and also ensure the authenticity of information, thereby ascertaining that each transaction is secure and is processed properly and safely. Every 10 minutes, mining computers collect a "block," or a few hundred pending Bitcoin transactions, and turn them into a mathematical puzzle. Those computers then use special equipment to compete against one another to solve that puzzle. Whoever completes the challenge first is eligible to receive a reward of 12.50+0.943 BTC, which is worth approximately $113,834.49 USD as of 7 February 2018. The Economist explains that the first miner to find the solution to the mathematical puzzle can announce it to the Bitcoin community. At that point, the other miners verify if the solution is correct. Assuming it is, the block is cryptographically added to the ledger, with the miners moving on to the next grouping of transactions, thereby adding to the blockchain. Source: Bitcoin 2.0 (SlideShare) How Malware Authors Are Abusing Crypto-Mining Crypto-mining isn't itself malicious in nature. But bad actors are abusing it for nefarious purposes. They're doing so by illegally accessing important business assets such as servers used for electronic medical record (EMR) systems or
Envoyé Oui
Condensat $1000 $113 $13 $19  in 000 086 2017 2018 50+0 834 943 about abusing accessing across actors add added adding adds advantage advertising affected after against aimed all allowing also an organization’s announce another any approximately are ascertaining asset's assets assuming attackers attacks authenticity authors back bad based because begin beginning benzinga better between bitcoin bitcoin's blacklist block blockchain blocker both browser btc business but calculations called calls came can challenge check chris circulation classifications clients' coin coinhive coinhive's collect comes community compete completes completing computers consensual consent consequences considerably considered constitute consumption continue corporate correct cpu crypto cryptocurrencies cryptocurrency cryptocurrency; cryptographically cto currency december deeper demands deploying designed didn't different differentiate digital discussion distributed dive doesn't doing domain domains don't don’t done down drive driven driving each earned easily economist eight electricity electronic eligible embedding emr enable end ends ensure enterprise entire equipment every expanded explains exposed extension february find first fold force fortunately found function general generate generates generating global gone grew grouping growing grown growth hacker had has have help herd here hijacking how hundred ibm's illegally important including increase index information installing instances isn't it's its its cpu/gpu cycles itself javascript joe jump just justify kaspersky known lab lacking later launched ledger lengths less let's levy like likely look looking made making malicious malware malwarebytes mathematical medical million mine miner minerblock miners miners: mines mining minutes monero money months most moving nature necessary nefarious negative networks new next non none noon's noscript now number numerous october offending official oftentimes one online operation ordinary organization's organization really organizations other over own owners owners' ownership parasiteware parasitic part peaking pending people period place play: point point's popular popularity position power powerful price process processed processes proof properly protect purpose purposes puzzle puzzles reach receive record recorded researchers resources responded revenue reward rexaline rigs run runs safely same screenshot scriptsafe secure secures security september servers shanthi should significantly single six sixth slideshare slow software solution solutions solve something sophos source: special specialized spot staff steps such sufficient supplement swiftly systems take tally target targets team tell than that's that when them themselves then thereby these they're those threat threats thus time to donate today tolerance tools top tracked transaction transactions turn two understand units unnoticed unsuspecting update usd use used user’s users users: utility value variety vendors verifies verify versions victimized wanted wants website websites what where which who whoever wider will without work works worth writer year year's yet yourself
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: