Defending Against Illicit Cryptocurrency Mining Activity
Malicious cyber actors use cryptocurrency-based malware campaigns to install cryptomining software and hijack the processing power of victim devices and systems to earn cryptocurrency. However, there are steps users can take to protect their internet-connected systems and devices against this illicit activity.In this week’s article, US-CERT provides some tips on how to secure your devices.
Read the article: https://www.us-cert.gov/ncas/tips/ST18-002
Did you miss a TechTips? Now you can visit the TechTips archives at www.apsva.us/post/category/techtips/.