More and more people are mining cryptocurrency to cash in on the craze. But some are actually hacking into computers to leverage other people's mining power. Sonatype's Senior Vice President Bill Karpovich explains the danger of these miners and how hackers exploited IBM several years ago.
"If 2017 was the year of ransomware, 2018 is going to be the year of crypto-jacking," says Karpovich. "It is amazing to see the rate of growth that are coming out."
Before Sonatype, Karpovich served as a General Manager for IBM's Cloud and Watson platform. He says a researcher on this project found crypto-jackers were finding the cheapest way to take advantage of IBM's cloud environment. But after discovering the breach, IBM was able to implement safeguards.
Karpovich says it's important to be aware, install latest patches and protection, and be accountable beyond security teams.
The new Pixel 8 smartphone released this week by Google includes an AI photo editing software that will allow users to change the expression of a person in pictures.
Earlier this month, the completely solar-powered car completed a journey across Morocco. The car was designed by students at the University of Technology in the Netherlands and the vehicle traveled over 600 miles just on solar power. It was dubbed a world first for an off-road solar-powered vehicle.
The Commerce Department on Tuesday updated and broadened its export controls to stop China from acquiring advanced computer chips and the equipment to manufacture them.