Facebook Vice President David Marcus is the face of the company's Libra digital currency, but the original driving force was a 26-year-old female corporate-development...Technologyread more
After a year of flooding, Midwest farmers face a stifling heat wave that's spreading across the U.S.Agricultureread more
There is no end in sight to the Boeing 737 Max grounding after two fatal crashes, prompting airlines to rethink their growth plans.Airlinesread more
A quarter of the S&P 500 companies report earnings next week, and that could buffet the market as investors await the July Fed meeting.Market Insiderread more
Iran's Revolutionary Guard claims a British tanker it still holds, Stena Impero, failed to follow international maritime rules.World Newsread more
Moving lots of data to a public cloud over the internet can take months or years. CNBC got an inside look at how AWS transfers data to the cloud for its clients.Technologyread more
The president also said he "offered to personally vouch" for Rocky's bail. Sweden, however, does not have a bail system.Politicsread more
CoinShares Chief Strategy Officer Meltem Demirors discusses Facebook's Libra project and its impact on the cryptocurrency market after testifying to the House Financial...Fast Moneyread more
Some 40% of Americans would struggle to come up with even $400 to pay for an emergency expense. Just how are so many Americans so short on cash? Blame debt.Personal Financeread more
Amazon hires Trump-allied lobbyist Jeff Miller as battle for Pentagon contract heats up.Politicsread more
In a series of tweets, the president addressed an unusual controversy stemming from a speech delivered Thursday by New York Fed President John Williams.Marketsread more
Even though cryptocurrency prices have fallen, cybercriminals could still take advantage of mining software, and not for the reasons you think.
Instead of creating alternative currencies, cryptomining software could be used for a more sinister attack that could steal corporate secrets, according to Troy Kent, a threat researcher at Awake Security. He presented his research at the InfoSecurity North America Conference in New York earlier this month.
"With this attack, people are using a tool, a crypto miner that they're used to seeing on their network. But they're not used to responding to it as though it is a legitimate threat, like a botnet or a Trojan," Kent said in an interview with CNBC. "They can come in and they can steal files, they can steal intellectual property, they can steal credentials and then log in as maybe the CEO. Or they can download more software. They can bring down services."
Kent said he is unsure whether hackers are already using this technique to attack companies, but wanted to share his research so businesses can be on guard.
"If I can do it, then absolutely an attacker could do it, whether they're very sophisticated or not sophisticated at all," he said.
The threat is stealthy and cybersecurity teams may have trouble finding it. "Depending on the type of detection that they're using, it's very possible that they [businesses] would miss this attack, or at least deprioritize it, or dismiss it as only a miner," Kent said
The attack begins like cryptojacking, when hackers take over your computer to mine cryptocurrencies for their profit.
To protect themselves, Kent suggests companies adopt more advanced detection methods based on behavior and analytics.