Traditional malicious attacks have evolved beyond file-based methods, with malicious files now existing as processes and services in order to evade detection. This article examines the rise of cryptojacking- the use of another's machine for profit through cryptocurrency mining, and how we're all at risk.
- cyber attacks
- Cyber defence
ASJC Scopus subject areas
- Computer Science(all)
- Computer Networks and Communications