When we sleep, attackers do not rest — our computer or smartphone can be secretly used for mining without our knowledge. This insidious type of attack is called cryptojacking: malicious scripts run in the background while we are inactive and shut down as soon as we return to the device. Continuous load on the processor can lead to overheating, system slowdown, reduced hardware lifespan, and increased electricity bills. Often such scripts are hidden in websites, extensions, or spam links — and we don't even suspect that our gadget has become someone else's 'miner'. How to protect yourself? Use antivirus software, blockers — for example, MinerBlock or No Coin — and don't forget to update systems.

#coin #crypto #scam