Have you ever heard of “Bitcoin”? They are a virtual currency that is used from the beginning of 2009 with open source.
Individual Bitcoin is calculated as cryptographic keys in a peer-to-peer networks.
It is one of their main advantages, since these keys can not be tampered with due to their unique characteristics.
Bitcoins, however, are similar to the regular currency. Virtual coins are simply stored on the media (such as hard drive, online storage or USB drive), but not in the wallet. As with any file on your hard drive, the one who has access to the media, also has access to your Bitcoins – like an open wallet lying anywhere.
The whole system is free and is not under the control of any organization. In the time of bankruptcy and the fear of inflation, it is hardly surprising that Bitcoins are rapidly evolving and are the main subject in the media. Their importance has grown rapidly in recent months. On the one hand this is due to global economic crisis, and on the other hand, due to the fact that the amount Bitcoins limited as precious metals.
In general, any computer can be used to create Bitcoins. The necessary software is free, so there is only the costs associated with the electricity required for your processor and graphics card. If you generate Bitcoins – this is not for you, you can exchange dollars for euros or virtual currency on countless sites. Even some online stores accept the new currency. That’s why Bitcoins must be taken seriously and not just as a fantasy. You should, however, be careful and do not consider it a real currency, as it is, nevertheless, a virtual currency.
As hackers get their hands on Bitcoins?
Bitcoins attracted cybercriminals. Bitcoins promise quick money. Violate the security of the program, and spyware is not in the bill, now in malware for Bitcoins. This is because Bitcoin can be used without identification by sending your unique key.
While these virtual coins can not be tampered with, they remain vulnerable to theft. Anyone with access to a computer or an Internet-storage that contains Bitcoins can steal them without any problems. It is usually sufficient to have only access to a computer person. Such cases have been several times. To date, the number of stolen Bitcoins were worth several tens of millions of dollars.
Traditional forms of theft – not the only method resorted to by the hackers in order to get their hands on Bitcoins. As mentioned earlier, the alternative currency is calculated by complex procedures using computers. Exchange rate with the conventional money that constantly reaches new heights in price, awakens more and more desire to have the leaders of a botnet to take their share. These leaders botnets currently use computers under their control, not only for DoS attacks, but also for receiving Bitcoins.
As cybercriminals continue to become more complex, it was found more and more specialized malware for Bitcoins. The most common is a variant of the Trojan Fareit. It first appeared on Russian porn site. He sets or “CG Miner”, or uses a PC for testing operations. The more infected computers, the faster the attacker gets new Bitcoins. This is very advantageous because large networks can earn at least 25 Bitcoins for about 10 minutes. One Bitcoin is currently (end of April 2013), costs about U.S. $ 140. For comparison, at the end of 2012, it cost just over $ 14.
How to protect yourself against malware for Bitcoins
In principle, the same protection rules apply here as from Trojans or classic programs designed to steal personal information. You should make sure that your software is always up to date, and that you use a secure password. A strong password is at least eight characters long and contains a number of upper-case letters, and special characters such as “BwN18tLs #”
Important: New vulnerabilities are constantly being discovered, ensuring that malware can infect unprotected computers, so that the user will not even notice. Using software effective protection in real time is a key factor.
Bitdefender Internet Security, for example, advance warns of suspicious and dangerous web sites right in your search results of Google and Bing, And also monitors the behavior of active processes for detect new and unknown viruses.