
Safe behaviors to protect yourself from cryptojacking follow the familiar rules you should adhere to every day to protect yourself against viruses, worms, bots, and malware, including ransomware, which are typically pushed to you through phishing techniques and social engineering:
|
|
How can endpoint security help?
Finally, make sure you have endpoint security software installed on your device, with its web-threat, anti-exploit, anti-phishing, anti-spyware, and anti-malware features fully enabled. Endpoint security is designed to warn you when threats arise; block you from going to infected sites; prevent system and browser exploits; and block the download, installation, and execution of coinmining malware. It can also help to restore your device to the way it was before the infection.
More specifically, Trend Micro Security and the Trend Micro Toolbar can protect your PC or Mac against all three types of coinmining malware outlined above. Features include:
|
|
Similarly, in Trend Micro Mobile Security for Android:
|
|
See Trend Micro Security Products Overview to see all the ways we protect you from web threats, viruses, bots, and malware, including ransomware and coinminers that can hijack your system. Trend Micro Security and Mobile Security protect PCs, Macs, Android and iOS devices.
Related Links: