• CERTIFICATE
    • Eminent VARs of India
    • Best OEM 2023
  • SYNDICATION
    • AMD
    • DELL TECHNOLOGIES
    • HITACHI
    • LOGMEIN
    • MICROSOFT
    • RIVERBED
    • STORAGECRAFT
    • THALES
  • EVENTS
  • GO DIGITAL
  • INFOGRAPHICS
  • PRESS
    • Press Release PR News Wire
    • Press Release Business Wire
    • GlobeNewsWire
  • SPECIAL
    • WHITE PAPER
    • TECHNOMANIA
    • SME
    • SMART CITY
    • SERVICES
    • EDITOR SPEAK
    • CSR INITIATIVES
    • CHANNEL GURU
    • CHANNEL CHIEF
    • CASE STUDY
  • TECHTREND
    • VAR PANCHAYAT
    • TELECOM
    • SOFTWARE
    • POWER
    • PERIPHERALS
    • NETWORKING
    • LTE
    • CHANNEL BUZZ
    • ASK AN EXPERT
  • SUBSCRIBE
  • Apps
  • Gaming
  • KDS
  • Security
  • Telecom
  • WFH
  • Subscriber to Newsletter
  • April Issue
  • Blogs
  • Vlogs
  • Faceoff AI
    

HOME
NEWS

Is your PC being used for cryptocurrency mining?


By VARINDIA - 2018-02-14
Is your PC being used for cryptocurrency mining?

It is a fact that, new technologies in the Information age will bring newer challenges and risk at the same time. There is a potential risk in adopting newly emerged technologies. For instance, Artificial Intelligence (AI) holds tremendous potential to automate daily risk activities, and rationalize costs. Blockchain technology will enable companies to manage and share GRC information faster than ever, whether it is around vendor risk assessments or continuous auditing. Robotics is all about automation, increasing efficiency and providing intelligence that cannot be seen with the human eye. The cloud, in turn, is enabling the seamless flow of data and Information assets include personal information. Security is one of the main enablers of data protection. It is an absolute fact that about millions of PCs are being used for stealth of cryptocurrency mining. It is advisable to block cryptocurrency mining in your browser.

 

The threat landscape is constantly evolving and the biggest cost associated with mining is the hardware to mine and the electricity to power the mining hardware. By leveraging malicious miners attackers can take both of those costs out of the equation altogether. Since they are able to take advantage of computing resources present in infected systems, there is no cost for power or hardware and attackers receive all the benefits of the mined coin. Your PC may be used to find cryptocurrency with or without your consent.

 

The biggest challenge is however on the IoT devices (Internet of Things (IoT) that makes it easy for you to control devices around your home) and bots (Bots allow users to consume a service without the need to download and ‘learn’ a new app0. Bots also operate using natural language, so the barrier for a new user to interact with a bot is really low. Bots provide the ideal interface for an IoT-enabled smart devices, and with their lack of monitoring and lack of day to day user engagement, they are fast becoming an attractive target for these attackers, as they offer processing power without direct victim oversight. While the computing resources within most IoT devices are generally limited, the number of exposed devices that are vulnerable to publicly available exploits is high which may make them attractive to cyber criminals moving forward.

 

search websites, domains hosting pirated content, and pornographic websites are the most likely to use cryptocurrency miners. Cybercriminals have taken advantage of cryptocurrency mining in order to make a profit. However, they generally use malware or applets (potentially unwanted applications) they install on the victim’s machine in order to turn a dishonest penny. The main target is the Websites with video-based content that keep users in place for some time are most likely to generate income from this method, with this they can trigger the System Objects including system files of root operating System. If you have activated your SSL Mechanism along with malware protection option, you may be safe but have to verify your system log information for the same.

 

Bitcoin mining or cryptocurrency mining software are acquired through the computational power and is not malware. If enough PC owners donate power, then mining can be a way to rake in revenue. The software itself is used to leverage computing power -- such as a visitor to a webpage's CPU -- to mine for cryptocurrency such as Monero. As per a survey, in a matter of weeks, 2.2 percent of the top 100,000 websites on the Alexa list are now mining through user PCs. In total, 220 sites launch mining when a user opens their main page, with an aggregated audience of 500 million people. CoinHive and JSEcoin are currently the most popular scripts being employed to hunt down cryptocurrency.

 

When customers buy a bitcoin mining contract then they will begin earning Bitcoins instantly. However, if domain operators do not respect their end users and do not seek permission, they are risking a hit to their reputation which they may not recover from. Until this issue is resolved, take note -- adblockers will generally block these scripts.

 

Tags: cryptocurrency mining, bitcoin, cryptocurrency, block cryptocurrency mining, Artificial Intelligence, ai, Blockchain technology, Robotics, varindia

See What’s Next in Tech With the Fast Forward Newsletter

SECURITY
View All
Zscaler announces AI innovations to its Data Protection Platform
Technology

Zscaler announces AI innovations to its Data Protection Platform

by VARINDIA 2024-05-20
SHIELD to enhance Swiggy’s fraud prevention and detection capabilities
Technology

SHIELD to enhance Swiggy’s fraud prevention and detection capabilities

by VARINDIA 2024-05-20
Axis Communications announces its first thermometric camera designed for Zone/Division 2
Technology

Axis Communications announces its first thermometric camera designed for Zone/Division 2

by VARINDIA 2024-05-20
SOFTWARE
View All
Hitachi Vantara and Veeam announce Global Strategic Alliance
Technology

Hitachi Vantara and Veeam announce Global Strategic Alliance

by VARINDIA 2024-05-16
Adobe launches Acrobat AI Assistant for the Enterprise
Technology

Adobe launches Acrobat AI Assistant for the Enterprise

by VARINDIA 2024-05-11
Oracle Database 23ai offers the power of AI to Enterprise Data and Applications
Technology

Oracle Database 23ai offers the power of AI to Enterprise Data and Applications

by VARINDIA 2024-05-10
START - UP
View All
Data Subject Access Request is an integrated module within ID-REDACT®
Technology

Data Subject Access Request is an integrated module within ID-REDACT®

by VARINDIA 2024-04-30
SiMa.ai Secures $70M Funds from Maverick Capital
Technology

SiMa.ai Secures $70M Funds from Maverick Capital

by VARINDIA 2024-04-05
Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure
Technology

Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure

by VARINDIA 2024-02-08

Tweets From @varindiamag

Nothing to see here - yet

When they Tweet, their Tweets will show up here.

CIO - SPEAK
Automation has the potential to greatly improve efficiency and production

Automation has the potential to greatly improve efficiency and production

by VARINDIA
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

by VARINDIA
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

by VARINDIA
Start-Up and Unicorn Ecosystem
GoDaddy harnesses AI power for new domain name recommendations

GoDaddy harnesses AI power for new domain name recommendations

by VARINDIA
UAE’s du Telecom selects STL as a strategic fibre partner

UAE’s du Telecom selects STL as a strategic fibre partner

by VARINDIA
JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

by VARINDIA
Rapyder partners with AWS to accelerate Generative AI led innovation

Rapyder partners with AWS to accelerate Generative AI led innovation

by VARINDIA
ManageEngine integrates its SIEM solution with Constella Intelligence

ManageEngine integrates its SIEM solution with Constella Intelligence

by VARINDIA
Elastic replaces traditional SIEM game with AI-driven security analytics

Elastic replaces traditional SIEM game with AI-driven security analytics

by VARINDIA
Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

by VARINDIA
Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

by VARINDIA
Dassault Systèmes to accelerate EV charging infrastructure development in India

Dassault Systèmes to accelerate EV charging infrastructure development in India

by VARINDIA
Tech Mahindra and Atento to deliver GenAI powered business transformation services

Tech Mahindra and Atento to deliver GenAI powered business transformation services

by VARINDIA
×

Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.

  • Distributors & VADs
  • Industry Associations
  • Telco's in India
  • Indian Global Leaders
  • Edit Calendar
  • About Us
  • Advertise Us
  • Contact Us
  • Disclaimer
  • Privacy Statement
  • Sitemap

Copyright varindia.com @1999-2024 - All rights reserved.