computing_logo
Sign in Join
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: [email protected]

    • Sign in
logo
  • logo

    Search Computing

     

     

  • Latest
  • Topics

    Choose a topic from the list below

    • Diversity in Tech
    • Big Data & Analytics
    • DevOps
    • Security
    • GDPR
    • AI & ML
    • Cloud & Infrastructure
    • CIO
    • Deskflix
  • Sustainability in Tech
  • Diversity in Tech
  • Deskflix
  • Events
  • Whitepapers
  • More

    Most Popular content

    • Big Data & Analytics
    • Cloud
    • Leadership & Strategy
    • Open Source
    • Storage
    • Telecoms
    • Top 100 IT Leaders
    • Rising Stars 30

    Featured content

    • On-demand webinars
    • Identity Access Management Hub
    • Research
    • Tech Marketing Hub
    • Entry-level tech roles
    • Cloud Sustainability

    Authors

    • Stuart Sumner
    • John Leonard
    • Tom Allen
    • Penny Horwood
    • Computing Contributors

    Computing Resources

    • English
    • Français
    • Deutsch
    • Espagnol
    • Italien

    About

    • About us
    • Code of Ethics
  • Searchlogo

    Search Computing

    x
Join Sign in
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: [email protected]

    • Sign in
    • Sign in

Crypto-malware

Security

New variant of Satori malware subverts other cryptocurrency mining malware by changing wallet address

Cryptocurrency miners infected with Satori malware will see gains given to someone else

clock 18 January 2018 • 2 min read

Security

Security researcher finds new Mac malware

Macs increasingly targeted by hackers

clock 17 January 2018 • 2 min read

Privacy

Warning over explosion in web browser-based crypto-mining

Javascript-based mining malware can use CPU cycles to mine for Monero crypto-currency

clock 30 November 2017 • 2 min read

Threats and Risks

Enterprise security: 'the fashion industry at work'?

Industry insiders comment on the findings of Computing's latest security research

clock 11 January 2017 • 6 min read

Security

Linux servers running Redis NoSQL database vulnerable to Linux.Lady crypto-currency mining Trojan

Linux.Lady Trojan turns Linux servers into manic miners

clock 11 August 2016 • 2 min read

Threats and Risks

TeslaCrypt criminals launch 'very strong' spam campaign to spread crypto-malware

Trojan's authors change tactics in apparent attempt to infect businesses with crypto-malware

clock 11 December 2015 • 2 min read
Most read
01

Bank of England proposes new rules to curb reliance on big tech

08 December 2023 • 1 min read
02

If ChatGPT is an 'iPhone moment' how should IT leaders respond?

08 December 2023 • 4 min read
03

Life after Oracle: Redefining Java in the enterprise in 2024

08 December 2023 • 5 min read
04

Hackers demand £300,000 to not leak royal family's medical records

04 December 2023 • 3 min read
05

UK accuses Russia of cyber interference targeting elections and democracy

08 December 2023 • 3 min read
  • Contact us
  • Marketing Solutions
  • About The Channel Company
  • Privacy Settings
  • Terms & Conditions
  • Policies
  • Careers
FOLLOW US
The Channel Company

© The Channel Company EMEA
180 Borough High Street, London SE1 1LB. Registered in England and Wales with company registration number 14078896

Loading.gif?page type=listing page&tag=crypto malware