Crypto-mining malware pirates processing power on a computer, smartphone, or other connected device to mine cryptocurrencies.
Crypto-mining malware pirates processing power on a computer, smartphone, or other connected device to mine cryptocurrencies.
Hackers most often gain access to computers by hiding cryptocurrency mining software in what appear to be legitimate, mundane software updates from brands like Microsoft and Adobe. Once a machine is infected, it uses its computing resources to mine for currency on behalf of the hacker. We’ll likely continue to see crypto-mining malware spread in 2020.
This trend is part of our section on Financial Technologies & Cryptocurrencies. Click here to see more trends in this section.
Accountants, Banking, Casinos/Gambling, Corporate Boards & Directors, Defense, Finance, Foreign & Defense Policy, Government - International, Government - National, Hedge Funds, Human Resources, Information Technology, Insurance, Law Enforcement, Lawyers/Law Firms/Legal Industry, National Security, Private Equity, Professional Services, Technology Company, Telecommunications, Venture Capital, Work (Future of)