Cryptojacking

Cryptojacking involves the unathorized use of scripts that run on web pages or in mobile apps to hijack the processing power of a user’s device and mine for cryptocurrencies like Bitcoin. It’s a threat that slows device performance and can shorten the life of a device.

Cryptojacking Articles & News

utilities reputation

Why reputation matters for utility companies

Since the Enron disaster in 2001, the utilities industry has been plagued by multiple scandals. While utility companies have the advantage of providing necessary services to the public, the competitive…

Help! I think I’ve been cryptojacked!

As part of Cybersecurity Awareness Month, we want to make sure you (the end user) understand the various threats attacking the thing that is more or less attached to you…

cryptojacking.

Hackers move to mobile as cryptojacking threat evolves

It’s been difficult to escape the hype around cryptocurrencies recently. It seems that everywhere you look, there is some new story focused on a topic that just three years ago…

Mobile Threat Landscape 2019

Wandera conducted an analysis of 100,000 devices across its network of corporate-assigned smartphones and tablets. The data revealed that the number of mobile devices connecting to cryptojacking sites and apps grew by 287% month over month in late 2018, and almost all of the exposed users were unaware that an unauthorized script was running on their device

Customer success stories

“We have more than 190 locations with 86,000 employees around the globe at SAP. Our first and foremost goal is awareness and transparency. Wandera plays a critical role in our technology stack, providing the security and peace of mind we need to run a global digital business and deliver value to our customers.”

The solution

Most mobile solutions only provide cyber threat detection at the endpoint. We go beyond with a multi-level approach offering dynamic security in the network, stopping attacks at source like zero-day phishing, and preventing rogue access to corporate cloud applications. Threat Intelligence is powered by MI:RIAM, the world’s leading machine learning for mobile risk.

Request a demo

Experience the platform yourself

Our team will get an understanding of your current mobile security challenges to give you a personalized demonstration of how Wandera can help your organization. Please fill out the form and one of our mobility experts will be in touch.