article thumbnail

GUEST ESSAY: Tapping Bitcoin’s security — to put a stop to ‘51% attacks’ of cryptocurrency exchanges

The Last Watchdog

However, if an attacker possesses 51% or more of the computational power of the entire network, they can force nodes to accept their alternate chain, because it’s built with more mining power than the “legitimate” chain currently on the network. Attackers can use this method of rewriting history to reverse transactions.

article thumbnail

Lemon_Duck cryptomining botnet targets Docker servers

Security Affairs

The Lemon_Duck cryptomining botnet is targeting Docker servers to mine cryptocurrency on Linux systems. Crowdstrikes researchers reported that the Lemon_Duck cryptomining botnet is targeting Docker to mine cryptocurrency on Linux systems. “The “a.asp” file is the actual payload in this attack. ” concludes the report.

Mining 88
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The most read OpenText blogs of 2019

OpenText Information Management

As we enter 2020, we’re taking a look back at the most read OpenText blogs of 2019. Here are the top 10 stories that caught your eye in 2019: 1. What’s the difference between data mining and text mining?

Mining 11
article thumbnail

Google obtained a temporary court order against CryptBot distributors

Security Affairs

CryptBot malware is active since at least 2019, it allows operators to steal sensitive data from the Google Chrome of the infected systems. This lawsuit targeting Cryptbot’s malware distributors shows our commitment to protecting users from each level of the cybercriminal ecosystem.” ” reads the announcement published by Google.

article thumbnail

MY TAKE: Why DDoS weapons will proliferate with the expansion of IoT and the coming of 5G

The Last Watchdog

His blog, Krebs on Security , was knocked down alright. And since Dyn routed traffic, not just to Krebs’ blog, but also to Twitter, Spotify, Netflix, Amazon, Tumblr, Reddit and PayPal, those popular websites were offline for some 12 hours, frustrating millions. Here we are in 2019 and the same attack strategy continues to persist.

IoT 263
article thumbnail

New variant of Linux Botnet WatchBog adds BlueKeep scanner

Security Affairs

Experts at Intezer researchers have spotted a strain of the Linux mining that also scans the Internet for Windows RDP servers vulnerable to the Bluekeep. ” reads a blog post published by Intezer. ” reads a blog post published by Intezer. ” continues the analysis. ” continues the analysis.

Mining 70
article thumbnail

GUEST ESSAY: Why any sudden influx of spam emails is an indicator of a likely security issue

The Last Watchdog

Typically, scammers want to get ahold of an email because it’s a gold mine of information. Take the WhatsApp data breach of 2019, where hackers got the personal data of 1.5 An email address’s connection to personal information is valuable, so scammers try to access it. Wider harm So why does it matter if someone has your email?

Security 188