New cryptocurrencies offer better anonymity, new security challenges

“Anonymous cryptocurrency malware also uses evasion technologies such as TOR or peer-to-peer file sharing to hide their communications. “Enterprises must understand that when they allow these types of technologies into the organization, they are bringing additional signals and risks that need to be monitored,” says Rod Soto, director of security research at Jask, a San Francisco-based cybersecurity vendor.”

Read more here.


Share on