Docker images under cryptojacking attack: how to check if a downloaded image is safe

Researchers at Kromtech Security Center discovers seventeen malicious Docker containers with embedded cryptominer applications that permitted to cybercriminals to earn $90,000 in 30 days.

Continue reading “Docker images under cryptojacking attack: how to check if a downloaded image is safe”

What is malicious cryptomining and how can i protect my computer from unwanted mining?

2018’s security trends: malicious cryptomining

Malicious cryptomining, also sometimes called drive-by mining, is when someone else is using your computer to mine cryptocurrency like Bitcoin or Monero: essentially, they are stealing your resources to make money.

Continue reading “What is malicious cryptomining and how can i protect my computer from unwanted mining?”