sha 256

Latest McAfee Report: Mining via Botnets Moves Into the Mainstream
June 24th, 2014

Security software company McAfee has introduced its latest quarterly report, which focuses on emerging threats – cryptocurrency mining botnets.

What is SHA-256?
April 28th, 2014

SHA-2 (Secure Hash Algorithm) – is a set of cryptographic algorithms – single-aimed hash functions including SHA-224, SHA-256, SHA-384 and SHA-512.

What is Bitcoin Mining?
April 25th, 2014

Bitcoin mining is the process of adding transaction records to Bitcoin’s public ledger of past transactions.