Skip to content
(203) 806-0120Bridgewater Corners, VT 05035jeremy@jeremymcclure.com
Facebook page opens in new windowTwitter page opens in new window
Login
JM Computers
If you can break it, I can fix it!
JM ComputersJM Computers
  • Home
  • Services & Offers
  • Current Threats
  • Contact
  • Social
  • Home
  • Services & Offers
  • Current Threats
  • Contact
  • Social

Category Archives: Crypto

You are here:
  1. Home
  2. Category "Crypto"

Infosecurity Europe: Cryptojacking is Making a Comeback

botnet, Crypto, Cryptocurrency, cryptojacking, guardicore, infosecurity Europe, Malware, nanshou cryptomining campaign, Podcasts, ServerBy Jeremy McClureJune 4, 2019

At Infosecurity Europe, a security expert from Guardicore discusses a new cryptomining malware campaign called Nanshou and why the cryptojacking threat is set to get worse. Infosecurity Europe: Cryptojacking is Making a Comeback

Old Malware Gives Criminals Tricky New Choice: Ransomware or Mining

Crypto, Cryptocurrency, Cryptominer, Email Spam, Malware, miner, Rakhni Trojan, Spam, Trojan, Vulnerabilities, WormBy Jeremy McClureJuly 6, 2018

The Rakhni Trojan is now giving bad actors the ability to infect victims either with a ransomware cryptor or a miner. Old Malware Gives Criminals Tricky New Choice: Ransomware or Mining

German Government Audits TrueCrypt

Backdoors, Crypto, Cryptography, Encryption, Open Source Security, Privacy, TrueCrypt, TrueCrypt Audit, VeraCrypt, VulnerabilitiesBy Jeremy McClureNovember 20, 2015

The German government published the results of its audit of open source disk encryption package TrueCrypt and gave it a relative clean bill of health. German Government Audits TrueCrypt

Threatpost News Wrap, October 16, 2015

Android, Chris Brook, Crypto, Cryptography, Diffie Hellman, Google, Government, Mike Mimoso, Podcasts, VulnerabilitiesBy Jeremy McClureOctober 16, 2015

Mike Mimoso and Chris Brook discuss the news of the week – how a weakness in the Diffie-Hellman protocol could be the key to breaking crypto, a paper that claims 85 percent of Android devices contain at least one critical vulnerability, and the Netgear debacle. Threatpost News Wrap, October 16, 2015

JM Computers
Go to Top