Skip to main content

Stop Sites From Harvesting Cryptocurrency From You

Your browser might be doing someone else’s dirty work behind your back, mining cryptocurrency for malicious individuals using your desktop or laptops to create the digital currency, which can potentially be exchanged for real cash. According to Wired, hackers have found a way to inject Javascript-based cryptocurrency mining software into compromised sites, borrowing your processing power (and slowing down your computer) to generate the cryptocurrency Monero without the approval of the site or its visitors. Luckily, there are some ways to stop the dirty tactic without resorting to staying off the Internet for good.

The process of browser-based cryptocurrency mining isn’t necessarily a bad thing, and you can take part even if you don’t own a single piece of the digital currency. Originally, cryptocurrency mining company Coinhive created its browser-based mining software to help sites further monetize their content, and allow them to afford a reduction in the number of ads you see on their page. All it takes is your approval to lend a negligible amount of your computer’s number-crunching processor power to the mining process for a short period of time. Unfortunately, hackers have now written similar mining software that continues to borrow CPU power without user consent, whether or not they use Coinhive’s browser-based mining tool. Constant mining from multiple sites could potentially slow down your machine.

If you’re worried about someone impacting your computer’s performance for personal gain, you can download and install the browser extension NoCoin, which disables cryptocurrency mining tools on sites you haven’t approved. NoCoin was made by developer Rafael Keradimas, and helps to solve the issue of compromised sites abusing the potentially beneficial tactic of borrowing visitors’ computers to mine cryptocurrency and monetize content, all with their consent. It’s available for Firefox, Google Chrome, and Opera web browsers.

You can also take steps to block Javascript from automatically running by installing an ad-blocking extension. We’ve recommended ad-blocking tools like AdBlock Plus in the past, as it stops advertisers along with other interested parties from learning about your browsing habits, or sending you pop-up ads and malware.

Comments

Popular posts from this blog

Dangerous sex Positions For Men

The most common cause of pénile injury is found among the variety of potentially dangerous positions used for séxual intercourse. The most popular is the ‘woman-on-top’. This type of position can result in an impact between the pénis against the female pelvis or perineum that can easily traumatize the pénile cylinders. A pénis becomes érect when the lining of the cylinder within it is engorged with blood.  A pénis fracture can occur when there is trauma to the eréct pénis, resulting in a rupture of the cylinder lining. This very painful injury is often accompanied by an abrupt, distressing cracking noise that is immediately followed by dark bruising of the pénis due to blood escaping the cylinder. In ten to 30% of pénis fractures, the urethra is damaged and blood may be visible at the urinary opening. Given these signs, an injury should be relatively simple to diagnose, right? You would be surprised, even with the unsettling sounds of a fracture occurring, many men...

Google Authenticator, a formidable layer of protection to your account.

​Google Authenticator is a free security app that can protect your accounts against password theft. It's easy to set up and can be used in a process called two-factor authentication (2FA) offered on popular social media services like Gmail, Facebook, Twitter, Instagram, etc.  The app ( iOS / Android ) generates a random code used to verify your identity when you're logging into various services. The code can technically be sent to your phone via text message every time— but the Google Authenticator app provides an extra level of security.  SMS-based 2FA has a  known security flaw , and any devoted hacker can attempt to  socially engineer  an attack against your phone company. The Google Authenticator app eliminates the possibility of an SMS-based attack  using algorithms  to generate the codes on your phone. Here's how to set it up: 1. Download Google Authenticator from either the Apple App Store or the Android Google Play store. It's free. 2. Nex...

AWS Battles Rivals: Advertising Campaign

Amazon Web Services has defeated IBM in a competition for lucrative federal contracts, threatened Microsoft's core businesses, and reshaped corporate technology. In the last few months, the pioneering cloud-computing unit of the online retail giant has taken a page from the playbook of some of its more traditional competitors: It started advertising. Ads have been splashed across billboards and in airport terminals, television spots and web videos, featuring a whiteboard full of sketches of software architecture and appeals to invent something using Amazon's collection of rented computing services. The advertising campaign, which bears the "Build On" tagline, represents a milestone in AWS' march from technology upstart to one of the major players in business software, technologists and marketers say. For many years, AWS didn't advertise, partly because it didn't have to. The service held a wide lead over the competition, and word-of-mouth was enough to...