Tag Archives: Threat Research

Botnet at large: Avast blocks Smominru miner

      No Comments on Botnet at large: Avast blocks Smominru miner

The good news is that Avast users are protected against cryptomining, which includes the current threat terrorizing the world’s Windows servers and computers. The Smominru botnet has torn through hundreds of thousands of servers and computers alike, hijacking their CPU power to mine the cryptocurrency Monero. ZDNet reports that the Smominru botnet mines 24 Monero ($8,500) a day, with a net total to date of 8,900 Monero ($2.8M – $3.6M).

Meltdown and Spectre: Yes, your device is likely vulnerable

Details have emerged this week regarding two different—and both substantial—security flaws in almost every computer processor in use today. This affects Windows, Mac, Linux, Android, and iOS. It’s important to note that as of yet, no malware or cyberattack has been associated with these flaws, but now that the information is in the public domain, that could change. Either of the flaws could lead to your computer’s memory being compromised, which means sensitive data—passwords, photos, credit card details—can be accessed and stolen. Here’s a breakdown of the two vulnerabilities:

Ladies and Gentlemen, prepare your CPU—web browser mining is coming

You may have noticed that certain websites put significant load on your CPU and slow it down. Aside from the possibility that you may not have the best hardware, the slowdown could be due to a JavaScript miner embedded in the website. Instead of getting bombarded with annoying ads, you may now be getting an ad-free experience while unknowingly lending your computing resources to help mine cryptocurrency—in this case Monero, a privacy-focused alternative to the ever-popular Bitcoin.

The 5 Vs of big data for machine learning

      No Comments on The 5 Vs of big data for machine learning

Most of today’s malware goes through automated modification, upgrade, and re-deployment so frequently and quickly that machine learning is a vital security solution component. Machine learning allows a system to learn from data and observation automatically. The most effective machine learning occurs when the learnings are gained via big data: the more information we feed our machines, the more accurately they identify trends and create models. This is true not only in security, but in every area that uses machine learning.