360 Total Security Blog Logo

Blog

Back to 360 Home
  • Latest Post
  • Products
  • Company News
  • Security News
  • Latest Post
  • Products
  • Company News
  • Security News
  • Download
  • 25 Google Play apps are discovered to cryptojack more than 120,000 users

    Sep 28, 2018Elley

    Google clearly stated in the Google Play Store developer rules updated on July 27 this year that it is forbidden to upload any cryptocurrency mining…

  • KomarMiner, a cryptomining Trojan disguising as cracking software, is spreading in the wild

    Sep 5, 2018Elley
    140 million gamers should be cautious that Steam game gives CryptoMining Trojan

    Recently, 360 Security Center monitored a kind of malicious mining Trojans disguising as all kinds of commonly used cracking software for big spread. At present,…

  • How do attackers use computational power to steal Crytocurrencies from mining pools?

    Aug 3, 2018Elley
    How do attackers use computational power to steal Crytocurrencies from mining pools?

    Recently, we detected a new type of attack which targets some equihash mining pools. After analysis, we found out the attacked equihash mining pools are…

  • 140 million gamers should be cautious that Steam game gives CryptoMining Trojan

    Aug 1, 2018Elley
    140 million gamers should be cautious that Steam game gives CryptoMining Trojan

    According to the report, “Abstractism” got removed from Steam game platform since its startup program contains mining function. The game’s item drop mechanism is obviously to encourage players to extend the game time, which is unlike other games that commonly used to complete tasks or collect items.

Facebook Twitter VK
360 Total Security Free Download For Windows 10/8.1/8/7/Vista/XP (32,64bit)
Top Articles
  • Microsoft released a security update for a new Office vulnerability found by 360

  • The biggest DDoS attack powered by 150,000 hacked IoT devices

  • 360MarvelTeam offers a solution to a new DoS flaw found on QEMU

  • Powerpool attack: Recent Windows zero-day vulnerability is exploited in tampering with Google Chrome

    Powerpool attack: Recent Windows zero-day vulnerability is exploited in tampering with Google Chrome

360 Total Security
Products
360 Total Security
360 Total Security Essential
360 Total Security Premium
360 Total Security for Mac
360 Total Security for Business
News
Products
Company News
Security News
Presskit
Investor Announcement
Contact us
Support
Qihoo 360
Business Partner
Affiliate
Reseller
© 2014 - 2023 Qihu 360 Software Co. Limited