You already know that cyber criminals are using malware to make victims' computers mine crypto currencies for them, but did you know that your phone can be instructed to do the same? A month ago researchers from G Data discovered mining code hidden in several repackaged popular Android apps on 3rd party apps stores.
Bitcoin Core - as the Bitcoin infrastructure software has been renamed to in order to avoid confusion with the the Bitcoin network - has been updated to make, among other things, transaction ID malleability attacks more difficult to execute.
A new version of the Darlloz Linux worm, which targets Internet-enabled devices such as home routers and security cameras, computers running Intel x86 architectures as well as some architectures that are usually found on routers and set-top boxes, has been analyzed by Symantec researchers.
The recent hacking and defacing of the blog and Twitter account of Mt.
News about what actually happened in the days leading up to the Mt.