360 Total Security Blog Logo

Blog

Back to 360 Home
  • Latest Post
  • Products
  • Company News
  • Security News
  • Latest Post
  • Products
  • Company News
  • Security News
  • Download
  • 25 Google Play apps are discovered to cryptojack more than 120,000 users

    Sep 28, 2018Elley

    Google clearly stated in the Google Play Store developer rules updated on July 27 this year that it is forbidden to upload any cryptocurrency mining…

  • KomarMiner, a cryptomining Trojan disguising as cracking software, is spreading in the wild

    Sep 5, 2018Elley
    140 million gamers should be cautious that Steam game gives CryptoMining Trojan

    Recently, 360 Security Center monitored a kind of malicious mining Trojans disguising as all kinds of commonly used cracking software for big spread. At present,…

  • How do attackers use computational power to steal Crytocurrencies from mining pools?

    Aug 3, 2018Elley
    How do attackers use computational power to steal Crytocurrencies from mining pools?

    Recently, we detected a new type of attack which targets some equihash mining pools. After analysis, we found out the attacked equihash mining pools are…

  • 140 million gamers should be cautious that Steam game gives CryptoMining Trojan

    Aug 1, 2018Elley
    140 million gamers should be cautious that Steam game gives CryptoMining Trojan

    According to the report, “Abstractism” got removed from Steam game platform since its startup program contains mining function. The game’s item drop mechanism is obviously to encourage players to extend the game time, which is unlike other games that commonly used to complete tasks or collect items.

Facebook Twitter VK
360 Total Security Free Download For Windows 10/8.1/8/7/Vista/XP (32,64bit)
Top Articles
  • webcam hacking protection

    Webcam Protection: Dos and Don’ts to protect yourself against webcam hacking

  • Have You Patch’ed Up?

  • No patch available for the Microsoft Windows MSHTML remote code execution vulnerability, 360 Total Security takes the lead to intercept it!

  • A new phishing scam on the rise: $30,100 USD has been made

    Phishing attacks use Azure Blob storage to simulate Microsoft

360 Total Security
Products
360 Total Security
360 Total Security Essential
360 Total Security Premium
360 Total Security for Mac
360 Total Security for Business
News
Products
Company News
Security News
Presskit
Investor Announcement
Contact us
Support
Qihoo 360
Business Partner
Affiliate
Reseller
© 2014 - 2023 Qihu 360 Software Co. Limited