Cryptojacking: Who/What/Why/When & How to Prevent Computer Power Being Stolen

Logo
Presented by

Jay Kelley, Senior Product Marketing Manager, Menlo, Lindsay Drabwell, Head of Member Services EMEA, (ISC)²

About this talk

As users become savvier and increasingly use ad blockers, advertising revenue is declining. Crypto coin mining is emerging as a new way for websites to monetise visitor traffic. But, there is a “dark side” to cryptomining: Cryptojacking, which includes, among other misdeeds, cryptomining without a website visitor’s permission or knowledge. While cryptojacking may seem like a victimless crime, since all that is being “stolen” is visitors’ computing and graphics processing power, it is anything but, and can lead to serious consequences. This session will focus on the differences between safe, legal cryptomining and dangerous cryptojacking, what it is, who is using it, why it is being used, when, how it is being abused, and how web browser isolation eliminates 100% of the cryptojacking risk. • How crypto coin mining is being used today • Why websites are moving away from advertising to crypto coin mining • How and why web browsers are being used to steal users’ compute power away without consent in most cases • How businesses can stop wide scale use of cryptojacking across all browsers and devices in their network through isolation
Related topics:

More from this channel

Upcoming talks (8)
On-demand talks (394)
Subscribers (93077)
ISC2 Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in cyber, information, software and infrastructure security while earning CPEs