Safety experts are alarming: the Internet has practically no protection against hackers

Cybercriminals managed to access part of Internet users in October 2016, attacking computers that served as a network switch. The goal of fraudsters became poorly protected webcams and other gadgets connected to the Internet, which in the aggregate became known as the Internet of Things (IoT).

The attack caused a small panic among the people who unsuccessfully tried to visit the Sony PlayStation Network, Twitter, GitHub and Spotify, but soon the event was forgotten and did not affect the long-term use of the Internet, as well as to work with compromised devices.

Today, security experts are alarming about the new and, perhaps a more dangerous type of IOT attack, which «hijacles» smart devices, secretly stealing their computing power to help cybercriminals to earn cryptocurrencies. Cryptocurrencies got their name due to the fact that they are based on cryptography. With it, there is a transactional protection and control of the release of new coins through the implementation of complex mathematical calculations. The faster the calculations occur, the more money makes the attackers. The main coin for mining through such schemes is Monero (

According to experts, the lack of effective measures to confront the cryptojection today can be the main problem of the development of the Internet of things tomorrow. The fact is that the more popular this technology is becoming, the greater the danger it can turn into its users in the event of the capture of the management from intruders. Based on this, today one of the most important tasks is to prevent the possibility of obtaining remote access with the subsequent capture of devices and the control sector.

Otherwise, the further development of the Internet of things may be threatened. The fact is that when gaining access to devices and valuable information, attackers will be able to get power over people. In the conditions of the impossibility of self-defense, the only way to protect themselves to the cryptogerasers for that they leave the user alone.

Earlier we wrote about how