705, 2019

How to protect yourself from cryptojacking

By |May 7, 2019|Categories: Hardware|Tags: , , , , , , , |

Hackers use cryptojacking to mine cryptocurrencies, and this process can cause PCs to run below optimal speeds.  If you have a relatively new computer but are experiencing performance problems after clicking a link or visiting a website, you might be a victim of cryptojacking. Here’s what to do. Hijacked hardware [...]

2202, 2018

Are hackers using your PC to mine Bitcoin?

By |February 22, 2018|Categories: Hardware|Tags: , , , , , , , , |

Cryptocurrencies like Bitcoin and Monero are so popular because they’re secure and potentially worth thousands of dollars. But investors and consumers aren’t the only ones interested in them. Hackers are using malicious tactics to steal cryptocurrency, and they’re doing it with something called cryptojacking. Hijacked hardware Cryptojacking secretly uses your [...]

802, 2018

The dangers of distributed spam distraction

By |February 8, 2018|Categories: Security|Tags: , , , , , , |

Users get around 200 emails in their inbox a day, including work messages, automated payment slips, and everyone’s least favorite email, spam. Spam messages are mostly harmless, but when you get more than 10,000 of them flooding your inbox, you’re probably the victim of a special type of spam attack. [...]

Go to Top