{"id":10923,"date":"2018-03-23T11:21:53","date_gmt":"2018-03-22T22:21:53","guid":{"rendered":"https:\/\/8bitisland.co.nz\/?p=10923"},"modified":"2018-03-23T11:25:19","modified_gmt":"2018-03-22T22:25:19","slug":"cryptojacking-is-the-new-threat-to-cyber-security","status":"publish","type":"post","link":"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/","title":{"rendered":"Cryptojacking is the new threat to cyber security"},"content":{"rendered":"

Symantec has released their annual Internet Security Report which has found that Crytojacking is the new threat to cyber and personal security on the interwebs.<\/p>\n

\u201cCryptojacking is a rising threat to cyber and personal security,\u201d said Mike Fey, president and COO, Symantec. \u201cThe massive profit incentive puts people, devices and organisations at risk of unauthorised coinminers siphoning resources from their systems, further motivating criminals to infiltrate everything from home PCs to giant data centres.\u201d No matter what industry you work in, it is important to keep your files and data as safe as possible. If you are not sure on how to go about this, there are many specialists who provide the services of Computer IT Support<\/a>, which would be ideal to look into when it comes to the security of your business.\n <\/p>\n

Kiwi’s aren’t immune from the threat either with New Zealand ranking 29th on the global list of countries attacked by Cryptojacking. In the technological age, no one is immune from the perils of a cyber attack. Thus, we should all try to be as aware as we possibly can about cybersecurity. The cybersecurity blog<\/a> may be able to provide you with some additional information.<\/p>\n

\u201cCrypto-jacking, while new, is becoming increasingly pervasive with the rise of cryptocurrency,\u201d said Mark Shaw, Technology Strategist, Pacific Region, Symantec. \u201cNew Zealand is an affluent nation with high levels of connectivity, this makes Kiwis a lucrative, and accessible target for cybercriminals.\u201d<\/p>\n

Symantec’s ISTR provides a comprehensive view of the threat landscape, including insights into global threat activity, cyber criminal trends and motivations for attackers. The report analyses data from the Symantec Global Intelligence Network\u2122, the largest civilian threat collection network in the world which tracks over 700,000 global adversaries, records events from 126.5 million attack sensors worldwide, and monitors threat activities in over 157 countries and territories. Key highlights include:<\/p>\n

Cryptojacking Attacks Explode by 8,500 Percent<\/u><\/strong><\/p>\n

During the past year, an astronomical rise in cryptocurrency values triggered a cryptojacking gold rush with cyber criminals attempting to cash in on a volatile market. Detections of coinminers on endpoint computers increased by 8,500 percent in 2017. Cybersecurity threats such as these have led to many cryptocurrency users storing their digital currency in cold wallets that cannot be accessed through the internet. However, when a crypto millionaire dies and leaves 5 million dollars of Ripple behind<\/a> in cold wallets that cannot be accessed by anyone other than him, the drawbacks of this method are clearly seen.<\/p>\n

With a low barrier of entry \u2013 only requiring a couple lines of code to operate \u2013 cyber criminals are harnessing stolen processing power and cloud CPU usage from consumers and enterprises to mine cryptocurrency. Coinminers can slow devices, overheat batteries, and in some cases, render devices unusable. For enterprise organisations, coinminers can put corporate networks at risk of shutdown and inflate cloud CPU usage, adding cost.<\/p>\n

\u201cNow you could be fighting for resources on your phone, computer or IoT device as attackers use them for profit,\u201d said Kevin Haley, director, Symantec Security Response. \u201cPeople need to expand their defences or they will pay for the price for someone else using their device.\u201d<\/p>\n

IoT devices continue to be ripe targets for exploitation. Symantec found a 600 percent increase in overall IoT attacks in 2017, which means that cyber criminals could exploit the connected nature of these devices to mine en masse<\/em>. Macs are not immune either with Symantec detecting an 80 percent increase in coin mining attacks against Mac OS. By leveraging browser-based attacks, criminals do not need to download malware to a victim\u2019s Mac or PC to carry out cyber attacks.<\/p>\n

Majority of Targeted Attackers Use Single Method to Infect Victims<\/u><\/strong><\/p>\n

The number of targeted attack groups is on the rise with Symantec now tracking 140 organised groups. Last year, 71 percent of all targeted attacks started with spear phishing \u2013 the oldest trick in the book \u2013 to infect their victims. As targeted attack groups continue to leverage tried and true tactics to infiltrate organisations, the use of zero-day threats is falling out of favour. Only 27 percent of targeted attack groups have been known to use zero-day vulnerabilities at any point in the past.<\/p>\n

The security industry has long discussed what type of destruction might be possible with cyber attacks. This conversation has now moved beyond the theoretical, with one in ten targeted attack groups using malware designed to disrupt.<\/p>\n

Implanted Malware Grows by 200 Percent, Compromising Software Supply Chain<\/u><\/strong><\/p>\n

Symantec identified a 200 percent increase in attackers injecting malware implants into the software supply chain in 2017. That\u2019s equivalent to one attack every month as compared to four attacks the previous year. Hijacking software updates provides attackers with an entry point for compromising well-guarded networks. The Petya outbreak was the most notable example of a supply chain attack. After using Ukrainian accounting software as the point of entry, Petya used a variety of methods to spread laterally across corporate networks to deploy its malicious payload.<\/p>\n

Mobile Malware Continues to Surge<\/u><\/strong><\/p>\n

Threats in the mobile space continue to grow year-over-year, including the number of new mobile malware variants which increased by 54 percent. Symantec blocked an average of 24,000 malicious mobile applications each day last year. As older operating systems continue to be in use, this problem is exacerbated. For example, with the Android operating system, only 20 percent of devices are running the newest version and only 2.3 percent are on the latest minor release.<\/p>\n

Mobile users also face privacy risks from grayware apps that aren\u2019t completely malicious but can be troublesome. Symantec found that 63 percent of grayware apps leak the device\u2019s phone number. With grayware increasing by 20 percent in 2017, this isn\u2019t a problem that\u2019s going away.<\/p>\n

<\/em>Business-Savvy Cyber Criminals Price Ransomware for Profit<\/u><\/strong><\/p>\n

In 2016, the profitability of ransomware led to a crowded market. In 2017, the market made a correction, lowering the average ransom cost to US$522 and signaling that ransomware has become a commodity. Many cyber criminals may have shifted their focus to coin mining as an alternative to cashing in while cryptocurrency values are high. Additionally, while the number of ransomware families decreased, the number of ransomware variants increased by 46 percent, indicating that criminal groups are innovating less but are still very productive.<\/p>\n","protected":false},"excerpt":{"rendered":"

Symantec has released their annual Internet Security Report which has found that Crytojacking is the new threat to cyber and personal security on the interwebs. \u201cCryptojacking is a rising threat to cyber and personal security,\u201d said Mike Fey, president and COO, Symantec. \u201cThe massive profit incentive puts people, devices and organisations at risk of unauthorised […]<\/p>\n","protected":false},"author":1,"featured_media":10926,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[217],"tags":[],"yoast_head":"\nCryptojacking is the new threat to cyber security - 8-Bit Island<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cryptojacking is the new threat to cyber security - 8-Bit Island\" \/>\n<meta property=\"og:description\" content=\"Symantec has released their annual Internet Security Report which has found that Crytojacking is the new threat to cyber and personal security on the interwebs. \u201cCryptojacking is a rising threat to cyber and personal security,\u201d said Mike Fey, president and COO, Symantec. \u201cThe massive profit incentive puts people, devices and organisations at risk of unauthorised […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"8-Bit Island\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/8bitisland\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-22T22:21:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-03-22T22:25:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i2.wp.com\/8bitisland.co.nz\/wp-content\/uploads\/2018\/03\/cryptojacking.jpg?fit=800%2C531&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"531\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@8BitIslandNZ\" \/>\n<meta name=\"twitter:site\" content=\"@8BitIslandNZ\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ben Carmichael\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/8bitisland.co.nz\/#organization\",\"name\":\"8-Bit Island\",\"url\":\"https:\/\/8bitisland.co.nz\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/8bitisland\/\",\"https:\/\/www.youtube.com\/channel\/UCdGchIIcujtpHtN3v-2X-Vg\",\"https:\/\/twitter.com\/8BitIslandNZ\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/8bitisland.co.nz\/#logo\",\"inLanguage\":\"en-NZ\",\"url\":\"https:\/\/i2.wp.com\/8bitisland.co.nz\/wp-content\/uploads\/2019\/12\/8-Bit-Header-1.jpg?fit=1057%2C506&ssl=1\",\"contentUrl\":\"https:\/\/i2.wp.com\/8bitisland.co.nz\/wp-content\/uploads\/2019\/12\/8-Bit-Header-1.jpg?fit=1057%2C506&ssl=1\",\"width\":1057,\"height\":506,\"caption\":\"8-Bit Island\"},\"image\":{\"@id\":\"https:\/\/8bitisland.co.nz\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/8bitisland.co.nz\/#website\",\"url\":\"https:\/\/8bitisland.co.nz\/\",\"name\":\"8-Bit Island\",\"description\":\"Gaming and tech news and reviews by Kiwis, for Kiwis\",\"publisher\":{\"@id\":\"https:\/\/8bitisland.co.nz\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/8bitisland.co.nz\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-NZ\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/#primaryimage\",\"inLanguage\":\"en-NZ\",\"url\":\"https:\/\/i0.wp.com\/8bitisland.co.nz\/wp-content\/uploads\/2018\/03\/cryptojacking.jpg?fit=800%2C531&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/8bitisland.co.nz\/wp-content\/uploads\/2018\/03\/cryptojacking.jpg?fit=800%2C531&ssl=1\",\"width\":800,\"height\":531},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/#webpage\",\"url\":\"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/\",\"name\":\"Cryptojacking is the new threat to cyber security - 8-Bit Island\",\"isPartOf\":{\"@id\":\"https:\/\/8bitisland.co.nz\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/#primaryimage\"},\"datePublished\":\"2018-03-22T22:21:53+00:00\",\"dateModified\":\"2018-03-22T22:25:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-NZ\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/8bitisland.co.nz\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cryptojacking is the new threat to cyber security\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/#webpage\"},\"author\":{\"@id\":\"https:\/\/8bitisland.co.nz\/#\/schema\/person\/fed669237cf7081ab8f4eca7236e35f5\"},\"headline\":\"Cryptojacking is the new threat to cyber security\",\"datePublished\":\"2018-03-22T22:21:53+00:00\",\"dateModified\":\"2018-03-22T22:25:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/#webpage\"},\"wordCount\":1029,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/8bitisland.co.nz\/#organization\"},\"image\":{\"@id\":\"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/8bitisland.co.nz\/wp-content\/uploads\/2018\/03\/cryptojacking.jpg?fit=800%2C531&ssl=1\",\"articleSection\":[\"Apps & Software\"],\"inLanguage\":\"en-NZ\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/8bitisland.co.nz\/#\/schema\/person\/fed669237cf7081ab8f4eca7236e35f5\",\"name\":\"Ben Carmichael\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/8bitisland.co.nz\/#personlogo\",\"inLanguage\":\"en-NZ\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b1df2c61b39b957f8986a8e4f0bb6488?s=96&d=retro&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b1df2c61b39b957f8986a8e4f0bb6488?s=96&d=retro&r=g\",\"caption\":\"Ben Carmichael\"},\"url\":\"https:\/\/8bitisland.co.nz\/author\/culturejam\/\"}]}<\/script>\n","yoast_head_json":{"title":"Cryptojacking is the new threat to cyber security - 8-Bit Island","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Cryptojacking is the new threat to cyber security - 8-Bit Island","og_description":"Symantec has released their annual Internet Security Report which has found that Crytojacking is the new threat to cyber and personal security on the interwebs. \u201cCryptojacking is a rising threat to cyber and personal security,\u201d said Mike Fey, president and COO, Symantec. \u201cThe massive profit incentive puts people, devices and organisations at risk of unauthorised […]","og_url":"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/","og_site_name":"8-Bit Island","article_publisher":"https:\/\/www.facebook.com\/8bitisland\/","article_published_time":"2018-03-22T22:21:53+00:00","article_modified_time":"2018-03-22T22:25:19+00:00","og_image":[{"width":800,"height":531,"url":"https:\/\/i2.wp.com\/8bitisland.co.nz\/wp-content\/uploads\/2018\/03\/cryptojacking.jpg?fit=800%2C531&ssl=1","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@8BitIslandNZ","twitter_site":"@8BitIslandNZ","twitter_misc":{"Written by":"Ben Carmichael","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/8bitisland.co.nz\/#organization","name":"8-Bit Island","url":"https:\/\/8bitisland.co.nz\/","sameAs":["https:\/\/www.facebook.com\/8bitisland\/","https:\/\/www.youtube.com\/channel\/UCdGchIIcujtpHtN3v-2X-Vg","https:\/\/twitter.com\/8BitIslandNZ"],"logo":{"@type":"ImageObject","@id":"https:\/\/8bitisland.co.nz\/#logo","inLanguage":"en-NZ","url":"https:\/\/i2.wp.com\/8bitisland.co.nz\/wp-content\/uploads\/2019\/12\/8-Bit-Header-1.jpg?fit=1057%2C506&ssl=1","contentUrl":"https:\/\/i2.wp.com\/8bitisland.co.nz\/wp-content\/uploads\/2019\/12\/8-Bit-Header-1.jpg?fit=1057%2C506&ssl=1","width":1057,"height":506,"caption":"8-Bit Island"},"image":{"@id":"https:\/\/8bitisland.co.nz\/#logo"}},{"@type":"WebSite","@id":"https:\/\/8bitisland.co.nz\/#website","url":"https:\/\/8bitisland.co.nz\/","name":"8-Bit Island","description":"Gaming and tech news and reviews by Kiwis, for Kiwis","publisher":{"@id":"https:\/\/8bitisland.co.nz\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/8bitisland.co.nz\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-NZ"},{"@type":"ImageObject","@id":"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/#primaryimage","inLanguage":"en-NZ","url":"https:\/\/i0.wp.com\/8bitisland.co.nz\/wp-content\/uploads\/2018\/03\/cryptojacking.jpg?fit=800%2C531&ssl=1","contentUrl":"https:\/\/i0.wp.com\/8bitisland.co.nz\/wp-content\/uploads\/2018\/03\/cryptojacking.jpg?fit=800%2C531&ssl=1","width":800,"height":531},{"@type":"WebPage","@id":"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/#webpage","url":"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/","name":"Cryptojacking is the new threat to cyber security - 8-Bit Island","isPartOf":{"@id":"https:\/\/8bitisland.co.nz\/#website"},"primaryImageOfPage":{"@id":"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/#primaryimage"},"datePublished":"2018-03-22T22:21:53+00:00","dateModified":"2018-03-22T22:25:19+00:00","breadcrumb":{"@id":"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/#breadcrumb"},"inLanguage":"en-NZ","potentialAction":[{"@type":"ReadAction","target":["https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/8bitisland.co.nz\/"},{"@type":"ListItem","position":2,"name":"Cryptojacking is the new threat to cyber security"}]},{"@type":"Article","@id":"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/#article","isPartOf":{"@id":"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/#webpage"},"author":{"@id":"https:\/\/8bitisland.co.nz\/#\/schema\/person\/fed669237cf7081ab8f4eca7236e35f5"},"headline":"Cryptojacking is the new threat to cyber security","datePublished":"2018-03-22T22:21:53+00:00","dateModified":"2018-03-22T22:25:19+00:00","mainEntityOfPage":{"@id":"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/#webpage"},"wordCount":1029,"commentCount":0,"publisher":{"@id":"https:\/\/8bitisland.co.nz\/#organization"},"image":{"@id":"https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/8bitisland.co.nz\/wp-content\/uploads\/2018\/03\/cryptojacking.jpg?fit=800%2C531&ssl=1","articleSection":["Apps & Software"],"inLanguage":"en-NZ","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/8bitisland.co.nz\/cryptojacking-is-the-new-threat-to-cyber-security\/#respond"]}]},{"@type":"Person","@id":"https:\/\/8bitisland.co.nz\/#\/schema\/person\/fed669237cf7081ab8f4eca7236e35f5","name":"Ben Carmichael","image":{"@type":"ImageObject","@id":"https:\/\/8bitisland.co.nz\/#personlogo","inLanguage":"en-NZ","url":"https:\/\/secure.gravatar.com\/avatar\/b1df2c61b39b957f8986a8e4f0bb6488?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b1df2c61b39b957f8986a8e4f0bb6488?s=96&d=retro&r=g","caption":"Ben Carmichael"},"url":"https:\/\/8bitisland.co.nz\/author\/culturejam\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/8bitisland.co.nz\/wp-content\/uploads\/2018\/03\/cryptojacking.jpg?fit=800%2C531&ssl=1","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pakeJI-2Qb","jetpack-related-posts":[{"id":13588,"url":"https:\/\/8bitisland.co.nz\/symantec-finds-cryptojacking-apps-on-microsoft-store\/","url_meta":{"origin":10923,"position":0},"title":"Symantec Finds Cryptojacking Apps on Microsoft Store","date":"February 18, 2019","format":false,"excerpt":"In alarming news, Symantec has revealed that they have found eight apps on Microsoft's app store that mine the cryptocurrency Monero without the user's knowledge. In January, Symantec discovered several potentially unwanted applications (PUAs) on the Microsoft Store that surreptitiously use the victim\u2019s CPU power to mine cryptocurrency. Symantec reporting\u2026","rel":"","context":"In "Apps & Software"","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/8bitisland.co.nz\/wp-content\/uploads\/2019\/02\/symantec.jpg?fit=750%2C500&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":11642,"url":"https:\/\/8bitisland.co.nz\/norton-is-bringing-their-high-performance-wi-fi-router-to-new-zealand\/","url_meta":{"origin":10923,"position":1},"title":"Norton is Bringing their High-performance Wi-Fi Router to New Zealand","date":"May 16, 2018","format":false,"excerpt":"Building on a heritage of industry-leading consumer cyber security solutions, Symantec today announced plans for the lauded Norton Core Wi-Fi router to be available for New Zealand consumers this winter. Named to Time Magazine\u2019s 25 best inventions of 2017, Norton Core is a high-performance uniquely-designed Wi-Fi router with built-in security,\u2026","rel":"","context":"In "Tech"","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/8bitisland.co.nz\/wp-content\/uploads\/2018\/05\/norton-core.jpg?fit=615%2C408&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":12231,"url":"https:\/\/8bitisland.co.nz\/norton-core-secure-wi-fi-router-is-now-available-in-nz\/","url_meta":{"origin":10923,"position":2},"title":"Norton Core Secure Wi-Fi Router is Now Available in NZ","date":"August 14, 2018","format":false,"excerpt":"Norton by Symantec has today announced that Norton Core is available for immediate purchase in New Zealand at Harvey Norman. Responding to the rapid uptake of Internet of Things (IoT) devices in the home and the cybersecurity vulnerabilities they present, Norton Core is a high-performance, high-speed Wi-Fi router that makes\u2026","rel":"","context":"In "Tech"","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/8bitisland.co.nz\/wp-content\/uploads\/2018\/05\/norton-core.jpg?fit=615%2C408&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9596,"url":"https:\/\/8bitisland.co.nz\/think-youre-safe-on-public-wi-fi-think-again\/","url_meta":{"origin":10923,"position":3},"title":"Think You’re Safe on Public Wi-Fi? Think Again","date":"July 31, 2017","format":false,"excerpt":"Let's face it, Kiwi's love their free Wi-Fi. Who hasn't seen a Wi-Fi location appear on their phone that is open and free to use and not raced to switch their phone over from using 4G Data? Free Wi-Fi is all well and good but in this day and age\u2026","rel":"","context":"In "Apps & Software"","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/8bitisland.co.nz\/wp-content\/uploads\/2017\/07\/public_wifi.jpg?fit=746%2C391&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":16661,"url":"https:\/\/8bitisland.co.nz\/the-nokia-3-4-is-out-now-in-nz\/","url_meta":{"origin":10923,"position":4},"title":"The Nokia 3.4 is out now in NZ!","date":"January 20, 2021","format":false,"excerpt":"The latest Nokia phone, the Nokia 3.4, has launched in NZ. You can pick one of these up at Spark, Noel Leeming, PB Tech, Warehouse Stationery, The Warehouse, and Harvey Norman for $299.\u00a0 https:\/\/youtu.be\/upL0seoy_9I More info about the 3.4: The Nokia 3.4 comes packed with a powerful processor \u2013 the\u2026","rel":"","context":"In "News"","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/8bitisland.co.nz\/wp-content\/uploads\/2021\/01\/Nokia-3.4_FJORD.jpg?fit=1160%2C1200&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":13046,"url":"https:\/\/8bitisland.co.nz\/all-new-macbook-air-takes-flight\/","url_meta":{"origin":10923,"position":5},"title":"All-New MacBook Air Takes Flight","date":"October 31, 2018","format":false,"excerpt":"Apple today introduced an all-new MacBook Air, bringing a stunning 13-inch Retina display, Touch ID, the latest processors and an even more portable design to the world\u2019s most loved notebook. As much as you'd love to buy this new much-anticipated MacBook Air, it may not be the right time for\u2026","rel":"","context":"In "PCs"","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/8bitisland.co.nz\/wp-content\/uploads\/2018\/10\/MacBook_Air.jpg?fit=750%2C329&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/8bitisland.co.nz\/wp-json\/wp\/v2\/posts\/10923"}],"collection":[{"href":"https:\/\/8bitisland.co.nz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/8bitisland.co.nz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/8bitisland.co.nz\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/8bitisland.co.nz\/wp-json\/wp\/v2\/comments?post=10923"}],"version-history":[{"count":0,"href":"https:\/\/8bitisland.co.nz\/wp-json\/wp\/v2\/posts\/10923\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/8bitisland.co.nz\/wp-json\/wp\/v2\/media\/10926"}],"wp:attachment":[{"href":"https:\/\/8bitisland.co.nz\/wp-json\/wp\/v2\/media?parent=10923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/8bitisland.co.nz\/wp-json\/wp\/v2\/categories?post=10923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/8bitisland.co.nz\/wp-json\/wp\/v2\/tags?post=10923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}