Bitcoin, Blockchain & Cryptocurrency News

Bitcoin
Ripple
Ethereum
Show details
Hide details
Market Cap
$93,746,973,933
Volume (24h)
$1,862,285,571
Market Cap
$32,807,326,246
Volume (24h)
$375,125,479
Market Cap
$18,177,395,021
Volume (24h)
$1,463,472,419
Next
event
»
Blockchain Life 2019  •  

# Cryptojacking News

April 10, 2019 by at Altcoins, Mining, News
Firefox, a free open-source web browser developed by Mozilla, a global non-profit organization that claims to be dedicated to putting web surfers in control of their online activities, has added anti-cryptojacking and fingerprinting functionality to Firefox Nightly 68 and Beta 67 versions, according to a blog post on April 9,...
April 5, 2019 by at Altcoins, Crime, Finance, News
North Korean hackers with the backing of Pyongyang are targeting cryptocurrency exchange platforms as part of efforts to raise funding for the country’s nuclear weapons program. Wired reports that several international cybersecurity experts believe a hacking syndicate based in the country is also responsible for attacks against banks across the...
March 29, 2019 by at Crime, News, Tech
Gustuff, a vicious Trojan horse created by a Russian-speaking cybercriminal known as “Bestoffer”, is now attacking Android smartphones with the sole aim of stealing users’ cryptos and fiat contained in the apps, reports TNW on March 28, 2019. Weapon of Mass Infection Touted as a “weapon of mass infection,” Gustuff...
A court in Japan has acquitted an individual accused of embedding a cryptojacking malware in his website to surreptitiously mine cryptocurrency using the computing power of the visitors to the site. Local Japanese media platform, The Mainichi reports that the court ruled that such activity wasn’t a criminal offense. Meanwhile,...
March 16, 2019 by at Crime, Cryptocyclopedia, Guides, Mining
As cryptocurrencies grew in acceptance as well as value and cryptocurrency mining became a lucrative business, cryptojacking has become the latest jackpot for cybercriminals. Thousands of websites globally that are operated by government agencies and the most recognized organizations are compromised by malicious con artists who harvest their victims’ CPU power...
Join our telegram channel