Home > Berta Bilbao

Author Archive: Berta Bilbao - Page 100

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

CYBER NEWS
DDoS attack methods

Frequent DDoS Attacks Against Gaming Sites

A worrisome trend has been spotted recently of continuous DDoS attacks. After the Lizard Squad attack against Destiny and Call of Duty servers, the researchers confirmed a high volume of attacks that happened in the first six months of 2014.…

CYBER NEWS
Kyle & Stan With Bigger Reach

Kyle & Stan Malvertising Network With Bigger Reach

Current situation The researchers had an unpleasant surprise two weeks ago, after the release of the first Cisco report concerning the malicious ad distribution campaign, according to which the malvertising network of Kyle and Stan has approximately nine times bigger…

THREAT REMOVAL

Ransomware Infections & the Users’ Options

The editor of Dark Reading Tim Wilson recently raised an provocative question in a comment he placed on the blog of Sara Peters, named “CryptoWall More Pervasive, Less Profitable than CryptoLocker”. Mr. Wilson provoked the security experts to share their…

HOW TO

How to Disable Autoloaders in Windows 7 and Windows 8

There is no direct connection between the different programs which get loaded as you boot and the various processes that slow down your computer a few hours later. Many programs that get automatically loaded when you boot fulfill their task…

HOW TO
How-to-Convert-PDF-To-Word

Converting PDF files to Word Document files

The converting of PDF files to Word Document files is important to many people , who have many different reasons for that. The conversion is possible, so let us see how it can be done. The PDF files are files…

HOW TO
effective online tools for writers

Top Online Effective Tools for Writers

Writers know that the best device they can use in order to write a good text is their brain, which through the voice and the fingers could result in an excellent piece of work. Living in modern world today however,…

CYBER NEWS
home depot teaching kids to build

Security Breach at Home Depot exposing more than 55 million credit cards

Home Depot suffered a security breach, which exposed at risk the users of 56 million unique credit cards. The hackers’ attacks and the malware have been dealt with according to information offered by the company. The malware was present in…

REVIEWS
13 TIRANIUM_ANTIVIRUS_2014_TEST_2

Is Your Antivirus to be trusted? / To Trust or Not to Trust Your Antivirus

Earlier this year the malware researcher Neil J. Rubenking published a review concerning Tiranium Premium Security 2014. After the review was published, he got a message from a user claiming that Tiranium abused different online websites associated with malware checks…

CYBER NEWS
browser-disabled

Android Browser with a Flow Attacking User’s Privacy

What Is the Android Browser Security Bug Android Security Bug has been found by the independent security researcher Rafay Baloch and is affecting 50 % of the Android users. The security bug has been found in the Android Browser app,…

CYBER NEWS
kindle-bug

Malicious Kindle Ebooks Help Hackers Access Amazon Accounts

The feud between book lovers about paper and electronic devices is constantly growing. If you are among the ones preferring to enjoy their read on a mobile device, you should be a bit more careful. Kindle Ebooks Injected with Malicious…

CYBER NEWS
malicious-email

Giveaways of a Malicious Email

Warning! This Email Is Malicious! Nowadays emails get proper spam filtering. Not long ago it was a lot easier for spam email to end up in your inbox. Luckily this is history now, especially if you use Gmail. Keep in…

HOW TO
Unknown-File

File Extension UNKNOWN – How to Open It?

Each file has an extension, but every now and then you may come across a file in an UNKNOWN format. In such cases, it is a real challenge to identify the type of the file and find an application to…

CYBER NEWS
Apple-Two-Factor-Verification

Apple’s iCloud with Two Factor Authentication

Shortly after the scandal with the nude celebrity pictures that leaked online, Apple has activated a 2FA (two-factor authentication) for iCloud. In the 2FA process user has to enter additionally a second passcode, which is dynamically generated and consists of…

HOW TO
browser-update

How to Update Your Browser

For the majority of the Internet users, the browser is their connection to the rest of the Web. It is used to navigate to various webpages, allows users to follow links, and helps them explore basically everything the Web has…

HOW TO
USB-device

What to Do When Your USB Device Doesn’t Work?

Here are a few tips what to do, if you are wondering what could possibly be wrong with your computer when you cannot get your USB device to work. Something is obviously broken, but you have no idea if it…

HOW TO

How to use Microsoft Office on Tablets and Smartphones?

Many critics question Microsoft’s lack of a decent platform for its MS Office suite on iPad tablets and different smartphones. Actually, Microsoft has numerous options of MS Office suitable for cell phones. They are just not completely featured versions of…

CYBER NEWS
Zemot-Malware

Zemot Malware: Delivered with Exploit Kits and Asprox Botnet

What Is Zemot? Zemot Dropper is a type of malware downloader. It is part of a complex network, which includes different malware types. Different variants of Zemot can be distributed with other malware as one dropper can spread many malicious…

THREAT REMOVAL
synolocker-ransomware

Synology NAS Devices Attacked by Synolocker Ransomware

What Is SynoLocker and How Does It Work? SynoLocker is a file encrypting ransomware that targets Synology NAS (Network Attached Storage) devices. What this particular piece of ransomware does is to exploit vulnerabilities in the DSM operating system. It targets…

CYBER NEWS
phishing-scheme

A Twitter Phishing Campaign Is After User’s Credentials

A campaign run on Twitter tries to lure users into landing on a phishing page which only goal is to get users’ credentials. It seems that either compromised Twitter accounts or bots are used to deliver a spam message with…

CYBER NEWS
Chrome-Web-Store

Malicious Apps Still End Up in Chrome Web Store

For some time now, Google has been trying to limit the security issues related to the numerous applications that get installed on Google Chrome along with the installation of various unverified extensions. It is mandatory for apps and extensions that…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree