Investors Hangout Stock Message Boards Logo
  • Mailbox
  • Favorites
  • Boards
    • The Hangout
    • NASDAQ
    • NYSE
    • OTC Markets
    • All Boards
  • Whats Hot!
    • Recent Activity
    • Most Viewed Boards
    • Most Viewed Posts
    • Most Posted
    • Most Followed
    • Top Boards
    • Newest Boards
    • Newest Members
  • Blog
    • Recent Blog Posts
    • Recently Updated
    • News
    • Stocks
    • Crypto
    • Investing
    • Business
    • Markets
    • Economy
    • Real Estate
    • Personal Finance
  • Market Movers
  • Interactive Charts
  • Login - Join Now FREE!
  1. Home ›
  2. Stock Message Boards ›
  3. Stock Boards ›
  4. Zerify Inc (ZRFY) Message Board

https://www.ajg.com/us/-/media/images/logos/galla

Message Board Public Reply | Private Reply | Keep | Replies (1)                   Post New Msg
Edit Msg () | Previous | Next


Post# of 82686
(Total Views: 948)
Posted On: 08/15/2019 6:34:41 PM
Avatar
Posted By: CyberC
Re: bta27 #58051

Industries Insurance Services News & Insights About Us

News & Insights
The New Cyberthreat: Cryptojacking

Every advancement in technology seems to give birth to a new threat vector. That’s certainly true as we begin to embrace the world of cryptocurrency.


Cryptocurrencies have emerged as an alternative means for financial transactions, while the value of a single bitcoin cryptocurrency rose to $20,000 in late 2017. Of course, hackers took notice and succeeded in stealing over $1 billion in cryptocurrency in 2018 alone. Unfortunately, the cyber threat goes beyond the theft of the currency itself. This new platform has given birth to a cybercrime known as cryptojacking.

Cryptojacking Defined
Cryptocurrency can be earned by a process called cryptomining. Cryptominers must first solve complex mathematical problems to validate transactions. To do this, they use software to create a very complex cryptographic puzzle that requires massive amounts of computing power.

But rather than use their own resources, cybercriminals infiltrate the networks of unsuspecting victims to leverage the victim’s computers for their own mining activities. Hackers then send the results back to servers they control. This often results in slowing or crashing of computer systems, equipment replacement costs, increased energy costs and lost productivity.

Cryptojackers use several methods of attack. These include:

Phishing emails: The victim clicks on a malicious link or attachment. This runs a code that injects a cryptomining script on the target computer. The script will continuously run, often undetected.
Drive-by mining: The hacker injects a cryptojacking script on targeted websites or pop-up ads. When a victim visits that website or receives a pop-up from the infected ad, the script will run and infiltrate the network.
Rogue employees: Insiders with access to IT infrastructure can set up cryptojacking systems, including physical servers, within the workplace premises.
Symantec provided additional insight into the threat in its annual Internet Security Threat Report. In January 2018, Symantec reports that they blocked 8 million cryptojacking attempts, compared to 3.5 million in December 2018. While it appears the frequency of attacks is trending down, the cryptojacking threat remains a credible threat to networks worldwide.

A combination of prevention and risk transfer provides an effective way to deal with the cryptojacking threat.
Several strategies can be deployed to help prevent a cryptojacking attack:

Web filtering tools should be used to block websites that are known to spread cryptojacking scripts.
A cryptojacking ad blocker can be installed to prevent infected ads from popping up.
Endpoint detection technology can recognize known crypto miners as soon as they penetrate the network.
Mobile device programs can manage vulnerable apps and malicious extensions that may be found on employee-owned devices.
Employees must be educated to recognize phishing emails in security awareness training programs
Transferring Cryptojacking Risk
Of course, there is no silver bullet that will prevent all cyberattacks. As a result, the commercial cyber insurance market has evolved along with cyber threats to facilitate options for cyberrisk transfer. These insurance policies can provide indemnification for both firstparty direct costs and subsequent third party liability costs in the aftermath of a cyberattack. While policy wording can differ among insurance companies, there are common coverages that are found in many policies. These may be especially helpful in transferring financial losses specific to a cryptojacking attack, including:

Business interruption: The cumulative effect of the slowing of hundreds or thousands of computers in one organization can lead to significant cost over time. Components may fail prematurely due to overuse, and critical controls may be affected. The resulting downtime and restoration process may cause financial loss, which may be recovered under a cyber insurance policy.
Network security liability: Companies may unknowingly transmit cryptomining code to other organizations, creating legal liability. Litigation costs and settlements may be covered under these policies.
Crisis management: Hackers may change tactics after the initial cryptojacking attack. Once they have access to networks, they may move laterally and access sensitive information that they can monetize, such as Social Security numbers and financial records. Costs to retain external vendors to investigate and respond to the attack, including IT forensics firms, privacy attorneys, credit monitoring fees, notification and call center costs, may be covered.
Increased costs due to fraudulent use of a victim’s vendor services, such as a cloud provider or internet-based services, may also be covered.
There’s no reason to believe that cryptojacking will disappear as a threat any time soon. Any effective strategy to foil the cryptojackers must reflect a variety of tactics including technology-based controls, employee training and insurance transfer mechanisms. It’s imperative that companies confront the threat of cryptojacking head-on—this potential for crippling damage is simply too great to do otherwise.

Link: https://www.ajg.com/us/insurance/cyber-liability-insurance/


(0)
(0)




Zerify Inc (ZRFY) Stock Research Links


  1.  
  2.  


  3.  
  4.  
  5.  


WORDS TO LIVE BY:

Never argue with stupid people, they will drag you down to their level and then beat you with experience.


Get .... PrivacyLok https://cyberidguard.com/

Try SafeVchat: https://cyberidguard.com/

My comments are only my opinion and are not to be used for investment advice.

Please conduct your own due diligence before choosing to buy or sell any stock.

xgqbj600g2g.jpg




Investors Hangout

Home

Mailbox

Message Boards

Favorites

Whats Hot

Blog

Settings

Privacy Policy

Terms and Conditions

Disclaimer

Contact Us

Whats Hot

Recent Activity

Most Viewed Boards

Most Viewed Posts

Most Posted Boards

Most Followed

Top Boards

Newest Boards

Newest Members

Investors Hangout Message Boards

Welcome To Investors Hangout

Stock Message Boards

American Stock Exchange (AMEX)

NASDAQ Stock Exchange (NASDAQ)

New York Stock Exchange (NYSE)

Penny Stocks - (OTC)

User Boards

The Hangout

Private

Global Markets

Australian Securities Exchange (ASX)

Euronext Amsterdam (AMS)

Euronext Brussels (BRU)

Euronext Lisbon (LIS)

Euronext Paris (PAR)

Foreign Exchange (FOREX)

Hong Kong Stock Exchange (HKEX)

London Stock Exchange (LSE)

Milan Stock Exchange (MLSE)

New Zealand Exchange (NZX)

Singapore Stock Exchange (SGX)

Toronto Stock Exchange (TSX)

Contact Investors Hangout

Email Us

Follow Investors Hangout

Twitter

YouTube

Facebook

Market Data powered by QuoteMedia. Copyright © 2025. Data delayed 15 minutes unless otherwise indicated (view delay times for all exchanges).
Analyst Ratings & Earnings by Zacks. RT=Real-Time, EOD=End of Day, PD=Previous Day. Terms of Use.

© 2025 Copyright Investors Hangout, LLC All Rights Reserved.

Privacy Policy |Do Not Sell My Information | Terms & Conditions | Disclaimer | Help | Contact Us