• Poutinetown@lemmy.ca
    link
    fedilink
    English
    arrow-up
    32
    arrow-down
    2
    ·
    1 year ago

    By using the computing resources of others’ servers to mine cryptocurrency, the cybercriminals can profit at the expense of the compromised organizations, whose CPU and GPU performance is degraded by the mining.

    Oh boy, where do I start…

    • BearOfaTime@lemm.ee
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      5
      ·
      1 year ago

      Right?

      I have so little sympathy for people who get owned today…

      And I say this as someone who’s always dragging my own feet to follow new security protocols and concepts, change passwords often, etc.

      But on the professional side… I do everything, and don’t let anything slide, even something seemingly minor. It’s those cracks that get exploited.

      So dot your “T’s” and cross your “I’s”, because that’s how you ensure this stuff doesn’t happen. Layers, layers and layers of security and oversight.