Standing Up To Cryptojacking: Best Practices For Fighting Back
By Sophos
Added
In this paper, they explore the differences between legitimate mining and cryptojacking; how cryptojacking works; the costs of cryptojacking to today’s organizations; and practical steps you can take to avoid being a victim of cryptojacking.
Tags
Endpoint Mobile device Malware Web browser Mobile app Extortion Financial gain Integrity Availability CredentialsTopic Map
