Skip to content
IT Security Magazine

IT Security Magazine

Information Technology Security News

  • Home
  • IT Security
    • IT Security News
    • Computer Security
    • Network Security
    • Network Monitoring
    • Cyber Security
    • Security & Privacy
  • IT Security Articles
  • Security Software
  • Security Magazines
  • About

Tag: cryptojacking

Hackers Infected 30000 Routers in India with Cryptocurrency Mining Malware

October 7, 2018 V.Kankanyan Cyber Security, IT Security News

According to security analysts  up to 30000 devices in India are infected with CoinHive software. Attackers have already forced almost 280,000 MicroTik routers in Latin America to mine Monero (XMR) non-stop, so the discovery of the




Read more

Recent Posts

  • Hackers Infected 30000 Routers in India with Cryptocurrency Mining Malware
  • Palestinian Hackers hacked the Israel Defense Magazines subscriber email list
  • Names and Social Security numbers of about 9700 Marylanders with disabilities were exposed
  • Bitcoin Exchange Poloniex website hacked
  • Forbes website hacked by the Syrian Electronic Army

Categories

  • Computer Security
  • Cyber Security
  • IT Security
  • IT Security Articles
  • IT Security News
  • Network Monitoring
  • Network Security
  • Security & Privacy
  • Security Software

Featured Software

Nsauditor Network Security Auditor
Network Security Auditing for possible vulnerabilities.Over 45 net tools.
Nsauditor is an advanced network security scanner for auditing and monitoring network computers for possible vulnerabilities. The software checks network computers using all potential methods that a hacker might use to attack it.
Buy Now | Download | Learn More

SpotAuditor
SpotAuditor is password recovery software, recovers over 40 programs passwords.
SpotAuditor is an advanced password recovery software for recovering over 40 programs passwords, including: Google Chrome, Internet Explorer, Firefox, Opera, FTP, hotmail, Microsoft Office Outlook passwords, recovers passwords behind the asterisks.
Buy Now | Download | Learn More

Product Key Explorer
Product Key Explorer recovers product keys from local or network computers.
Product Key Explorer is a powerful product key find and product key recovery software for Windows, Microsoft Office, SQL Server, Nero, Adobe CS3,CS4,CS5,CS6 and +10000 other software. It recovers product keys from local or network computers.
Buy Now | Download | Learn More

Tags

Computer Security cryptojacking Cyber Security hacking Information Security IT Security IT Security Articles IT Security News malware monero Network Monitoring network security network security auditing Security & Privacy security policy

Archives

  • October 2018
  • March 2014
  • February 2014
  • January 2014
WordPress Theme: zeeDynamic by ThemeZee.