More and more people are mining cryptocurrency to cash in on the craze. But some are actually hacking into computers to leverage other people's mining power. Sonatype's Senior Vice President Bill Karpovich explains the danger of these miners and how hackers exploited IBM several years ago. "If 2017 was the year of ransomware, 2018 is going to be the year of crypto-jacking," says Karpovich. "It is amazing to see the rate of growth that are coming out." Before Sonatype, Karpovich served as a General Manager for IBM's Cloud and Watson platform. He says a researcher on this project found crypto-jackers were finding the cheapest way to take advantage of IBM's cloud environment. But after discovering the breach, IBM was able to implement safeguards. Karpovich says it's important to be aware, install latest patches and protection, and be accountable beyond security teams.

Share:
More In Technology
Minnesota Nuclear Plant Shuts Down for Leak; Residents Worry
A Minnesota utility began shutting down a nuclear power plant near Minneapolis on Friday after discovering water containing a low level of radioactive material was leaking from a pipe for the second time. While the utility and health officials say it is not dangerous, the issue has prompted concerns among nearby residents and raised questions about aging pipelines.
Twitter Hunts Github User Who Posted Source Code Online
Some parts of Twitter's source code — the fundamental computer code on which the social network runs — were leaked online, the social media company said in a legal filing that was first reported by The New York Times.
Load More