As the hype around digital transformation continues to persist, the terms ‘digitization’ and ‘digitalization’ join the fray, increasing the level of hype while adding confusion.…
In last week’s article on the Blockchain Expo in London, I pointed out that many blockchain-based endeavors struggle to find a rational business model. In…
In a classic episode of South Park, the boys encounter a lair of Underpants Gnomes – so named because they run a business collecting underpants.…
As the 2017 Equifax data breach illustrates, unpatched software represents a massive cybersecurity challenge for enterprises today. In that case, the vulnerability in question was…
My Digital Influencer series for Forbes has featured DevOps thought leaders Gene Kim and Jez Humble, coauthors of the new book Accelerate: The Science of…
Under CEO Ginni Rometty’s leadership, IBM has been undergoing its riskiest transformation since the Gerstner era. With massive bets on artificial intelligence, blockchain, and quantum…
In my article We Need To Shut Bitcoin And All Other Cryptocurrencies Down. Here’s Why from last week, I made the argument that cryptomining (the…
Last week I wrote an article on illicit cryptomining – how hackers are sneaking cryptocurrency transaction processing software onto corporate networks, personal computers, and other…
非法加密货币挖矿最阴险的方面在于,受害者对此浑然不觉。专家表示,在这种新的商业模式下,攻击者不再惩罚打开附件或运行恶意脚本的受害者,而是通过劫持系统要求支付赎金。 【51CTO.com快译】非法加密货币挖矿最阴险的方面在于,受害者对此浑然不觉。思科公司Talos威胁情报部门(简称“Talos团队”)的专家们表示,在这种新的商业模式下,攻击者不再惩罚打开附件或运行恶意脚本的受害者,而是通过劫持系统要求支付赎金。现在,攻击者在积极利用被感染系统的资源进行加密货币挖矿。 … 原文标题:Top Cyberthreat Of 2018: Illicit Cryptomining,作者:Jason Bloomberg Read the entire translation at http://netsecurity.51cto.com/art/201803/567540.htm.
Ransomware is oh, so 2017. Today, all the smart hackers have turned to illicit cryptomining to fill their coffers. Due to a combination of a…