The New Gold Rush: How to Hack Your Own Best Mining Rig


Posted on in Presentations

2018 is the year of malicious crypto-mining attacks, as threat actors turn from doubtful one-off payment disruption attacks to cryptojacking malware attacks, which almost guarantee a payday, with a negligible chance of being discovered. The new cryptocurrency mining attacks are relatively simple and secretly utilizing the processing power of the victim device to mine for the cryptocurrency.

Learning Objectives:
1: Understand the simplicity of crypto-mining attacks.
2: Learn how to build a decentralized platform dedicated to crypto-mining.
3: Learn about steps to take to protect digital assets and bank accounts.
Participants
Roy Katmor

Participant

GM, Endpoint Solutions, Fortinet

Udi Yavo

Participant

CTO, EndPoint Solutions, Fortinet


Share With Your Community