Cryptojacking: Difference between revisions
Added background information, motive, symptoms, and preventative strategies |
Applied modification ruleset: Bold title normalization |
||
| (2 intermediate revisions by 2 users not shown) | |||
| Line 1: | Line 1: | ||
Cryptojacking refers to the unauthorized usage of another person's computer to mine cryptocurrency. This process is usually done without the knowledge of the victim.<ref>https://www.csoonline.com/article/3253572/what-is-cryptojacking-how-to-prevent-detect-and-recover-from-it.html</ref> | '''Cryptojacking''' refers to the unauthorized usage of another person's computer to mine [[cryptocurrency]]. This process is usually done without the knowledge of the victim.<ref>https://www.csoonline.com/article/3253572/what-is-cryptojacking-how-to-prevent-detect-and-recover-from-it.html</ref> | ||
This can occur to virtually any device, and is usually performed through web browser downloads or rogue mobile apps.<ref>https://www.malwarebytes.com/cryptojacking</ref> | This can occur to virtually any device, and is usually performed through web browser downloads or rogue mobile apps.<ref>https://www.malwarebytes.com/cryptojacking</ref> | ||
| Line 7: | Line 7: | ||
== Symptoms == | == Symptoms == | ||
There are several ways to tell if a computer has been hacked in order to mine cryptocurrency without the consent of the owner. | There are several ways to tell if a computer has been hacked in order to mine [[cryptocurrency]] without the consent of the owner. | ||
* Performance of devices greatly decreasing or noticeable increase of processing usage | * Performance of devices greatly decreasing or noticeable increase of processing usage | ||
| Line 22: | Line 22: | ||
== References == | == References == | ||
<references /> | <references /> | ||
[[Category:Glossary]] | |||