×

Register now to watch this webcast on demand!

First Name
Last Name
Phone Number
Company
Job Title
Country
I want to receive Umbrella newsletters, updates, and promotions. Withdraw your consent at any time.
I do not want to receive email communications about products & offerings from Umbrella & affiliates.
I am an MSP, IT Provider or Reseller contacting you on behalf of a customer
Thank you!
Error - something went wrong!

Cryptomining: The next malware attack

September 28, 2018

Mining for cryptocurrencies is no small task; it takes a lot of CPU and GPU cycles to process the data necessary to generate the currencies. Not everyone has the technical wherewithal, financial resources and the massive amount of hardware to build their own cryptomine, so what options do they have? The answer is simple and as old as time: If you don’t have the resources, you “borrow” (steal?) from someone who does.

This webcast looks at how cryptomining works and how to determine if your computing resources are being used without your knowledge for cryptomining.

Previous Video
Off-Network: The New Security Normal
Off-Network: The New Security Normal

In today's always-connected world, much happens beyond the network (especially in the cloud) and the concep...

Next Video
Ransomware and Other Emerging Threats Within Healthcare Organizations
Ransomware and Other Emerging Threats Within Healthcare Organizations

The healthcare sector has been significantly impacted by ransomware in the last five years. HIMSS explains ...