Videos

Published on September 29th, 2018 📆 | 2841 Views ⚑

0

Cryptomining: The next malware attack


https://www.ispeech.org/text.to.speech


Mining for cryptocurrencies is no small task; it takes a lot of CPU and GPU cycles to process the data necessary to generate the currencies. Not everyone has the technical wherewithal, financial resources and the massive amount of hardware to build their own cryptomine, so what options do they have? The answer is simple and as old as time: If you don’t have the resources, you “borrow” (steal?) from someone who does.

This webcast looks at how cryptomining works and how to determine if your computing resources are being used without your knowledge for cryptomining.

video, sharing, camera phone, video phone, free, upload
2018-09-29 01:28:29

source





Tagged with:



Comments are closed.