HomeContributing AuthorsHow and Why Bitcoin Mining Poses Security Risks

    How and Why Bitcoin Mining Poses Security Risks

    From 2017 to 2018, the cost of one Bitcoin increased over one thousand percent. This rapid growth dominated headlines and ignited a cryptocurrency boom that left consumers everywhere wondering how to get a slice of the Bitcoin pie. For those that want to join the craze without trading traditional currencies like U.S. dollars, a process called “Bitcoin mining” appears to be a great way to get involved. However, Bitcoin mining introduces a number of security risks.

    What is Bitcoin mining?

    Mining for Bitcoin is like mining for gold—you put in the work and you get your reward. But instead of back-breaking labor, you earn the currency with your time and computer processing power. “Miners”, as they are called, essentially upkeep and help secure Bitcoin’s decentralized accounting system.

    Each time there’s a transaction it’s recorded in a digital ledger called the “blockchain.” Miners help to update the ledger by downloading a special piece of software that allows them to verify and collect new transactions to be added to the blockchain. Then, they must solve a mathematical puzzle to be able to add a block of transactions to the chain. In return, they earn Bitcoins, as well as transaction fees.

    What are the security risks?

    As the digital currency has matured, Bitcoin mining has become more challenging. In the beginning a user could mine on their home computer and earn a good amount of the digital currency, but these days the math problems have become so complicated that it requires a lot of expensive computing power.

    This is where the risks come in. Since miners need an increasing amount of computer power to earn Bitcoin, some have started compromising public Wi-Fi networks so they can access users’ devices to mine for Bitcoin. This recently happened at a coffee shop in Buenos Aires, which was infected with malware that caused a 10-second delay when logging in to the cafe’s Wi-Fi network. The malware authors were using this time to access the users’ laptops for mining.

    In addition to public Wi-Fi networks, millions of websites are being compromised to access users’ devices for mining. In fact, this has become such a widespread problem, that over 1 billion devices are believed to be slowed down by web-based mining. And slowing your device down is not even the worst thing that could happen. A device that is “cryptojacked” could have 100 percent of its resources used for mining, causing the device to overheat, essentially destroying it.

    Now that you know a little about Bitcoin mining and the risks associated with it, here are some tips to keep your devices safe as you monitor the cryptocurrency market:

    • Avoid public Wi-Fi networks—These networks often aren’t secured, opening your device and information up to a number of threats.
    • Use a VPN— If you’re away from your secure home or work network, consider using a virtual private network (VPN). This is a piece of software that gives you a secure connection to the Internet, so that third parties cannot intercept or read your data. A product like McAfee Safe Connect can help safeguard your online privacy no matter where you go.
    • Secure Your Devices—New threats like Bitcoin malware are emerging all of the time. Protect your devices and information with comprehensive security software, and keep informed on the latest threats.

    To read more on cryptocurrency threats, visit mcafee.com.

    ELE Times Research Desk
    ELE Times Research Deskhttps://www.eletimes.ai
    ELE Times provides a comprehensive global coverage of Electronics, Technology and the Market. In addition to providing in depth articles, ELE Times attracts the industry’s largest, qualified and highly engaged audiences, who appreciate our timely, relevant content and popular formats. ELE Times helps you build awareness, drive traffic, communicate your offerings to right audience, generate leads and sell your products better.

    1 COMMENT

    LEAVE A REPLY

    Please enter your comment!
    Please enter your name here

    Related News

    Must Read

    Building Reliable 5G and 6G Networks Through Mobile Network Testing

    The development of communication networks has entered a revolutionary...

    Beyond the Screen: envisioning a giant leap forward for smartphones from physical objects to immersive experiences

    Author: STMicroelectronics Smartphones have become some of the most ubiquitous...

    Microchip’s SkyWire Tech Enables Nanosecond-Level Clock Sync Across Locations

    To protect critical infrastructure systems, SkyWire technology enables highly...

    Next Generation Hybrid Systems Transforming Vehicles

    The global automotive industry is undergoing a fundamental transformation...

    Tobii and STMicroelectronics enter mass production of breakthrough interior sensing technology

    Tobii and STMicroelectronics announced the beginning of mass production...

    Rohde & Schwarz unveils compact MXO 3 oscilloscopes with 4 and 8 channels

    Rohde & Schwarz expands its next-generation MXO oscilloscope portfolio...

    TI’s new power-management solutions enable scalable AI infrastructures

    Texas Instruments (TI) debuted new design resources and power-management...

    ESA awards Rohde & Schwarz for contributions to 30 years European Satellite Navigation

    The event brought together institutional and industrial partners, ESA...