Home > Martin Beltov

Author Archive: Martin Beltov - Page 51

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

THREAT REMOVAL

ARGUS CRYPTOR V1.0 Virus – How to Remove It (+Restore Files)

This article will aid you to remove ARGUS CRYPTOR V1.0 virus. Follow the ransomware removal instructions provided at the end of the article. ARGUS CRYPTOR V1.0 virus is one that encrypts your data and demands money as a ransom to…

THREAT REMOVAL

Remove FreeLocalWeather Browser Hijacker

The article will aid you to remove FreeLocalWeather completely. Follow the browser hijacker removal instructions provided at the bottom of this article. FreeLocalWeather is a browser hijacker redirect developed by the MindSpark. Its website will redirect you to its search…

CYBER NEWS

CVE-2018-15961: Adobe ColdFusion Vulnerability Exploited By Hackers

Computer hackers have been found to use the Adobe ColdFusion vulnerability which is tracked in the CVE-2018-15961 advisory. This is a known exploit which continues to be widely adopted by various criminal collectives. Targets all over the world have been…

CYBER NEWS

WordPress Bug Endangers WooCommerce Shop Owners

Online merchants using WordPress as a platform can become victims of a new remote code execution flaw. A new security report reveals that the bug can interact with the WooCommerce plugin, as a result the criminals can overtake the shops.…

CYBER NEWS

Bcmupnp_Hunter Botnet Set Against IoT Devices: 100.000 Are Already Infected

Security researchers the BCMUPnP_Hunter botnet which appears to be specifically targeted against IoT devices. It targets a five-year old vulnerability which appears to be left unpatched by many devices. Since is launch it has since infected about 100,000 IoT devices.…

CYBER NEWS

Side-channel Attacks Found to Affect GPU Cards

A new security report shows that GPU cards are vulnerable to new side-channel attacks. These exploits target both individual end-users that use them in day-to-day activities and clusters that rely on GPUs for distributed computing. GPU Cards Follow CPUs By…

CYBER NEWS

Evernote Vulnerability Abused To Steal Files From Victim Users

A new Evernote vulnerability was recently announced which has been found to allow hackers to hijack files from the victims. It is a cross-site scripting bug (XSS) which also gives the operators the ability to execute arbitrary commands. While a…

THREAT REMOVAL

Remove Google Docs Phishing Scam — How to Protect Yourself

This article has been created in order to explain to you what is the Google Docs Phishing Scam and how you can remove them as well as all potentially unwanted programs delivered through them. The Google Docs Phishing Scam is…

THREAT REMOVAL

Remove Doppler Weather Radar Browser Hijacker

The article will aid you to remove Doppler Weather Radar completely. Follow the browser hijacker removal instructions provided at the bottom of this article. Doppler Weather Radar is a browser hijacker redirect developed by the Polarity. Its website will redirect…

THREAT REMOVAL

Aperfectday2018 Virus – How to Remove It (+Restore Files)

This article will aid you to remove Aperfectday2018 virus. Follow the ransomware removal instructions provided at the end of the article. Aperfectday2018 virus is one that encrypts your data and demands money as a ransom to get it restored. Files…

THREAT REMOVAL

Remove Twitter Phishing Scam — How to Protect Yourself

This article has been created in order to explain to you what is the Twitter Phishing Scam and how you can remove them as well as all potentially unwanted programs delivered through them. The Twitter Phishing Scam is a popular…

CYBER NEWS

CVE-2018-16986: BLEEDINGBIT Vulnerability Exposes Millions of Bluetooth LE Devices

A team of security researchers announced the discovery of the BLEEDINGBIT vulnerability which practically makes millions of Bluetooth devices easy to hack. The issue here is related to two weaknesses demonstrated by the Bluetooth Low Energy (BLE) chips made by…

CYBER NEWS

CVE-2018-5407: Portsmash Side-channel Vulnerability Is a New CPU Bug

Another serious issue has been found targeting modern CPUs — the Portsmash Side-channel Vulnerability which is similar to previous cases like Meltdown. By exploiting this bug hackers can hijack information from processes that are running in the same core. CVE-2018-5407:…

THREAT REMOVAL

SnowPicnic Virus – How to Remove It (+Restore Files)

This article will aid you remove SnowPicnic Virus effectively. Follow the removal instructions at the end. The SnowPicnic Virus is a newly discovered ransomware threat that does not belong to any of the known malware families. The identity of the…

CYBER NEWS

Kraken Ransomware and Fallout Exploit Kit Used In Large-Scale Attacks

The Kraken ransomware is one of the latest virus threats that are being used by hacker groups against victims worldwide. It appears that the majority of them are caused through the Fallout Exploit Kit which was previously used for GandCrab…

THREAT REMOVAL
g.results.supply hijacker main page sensorstechfroum removal guide

Remove g.results.supply Browser Hijacker

This article explains the issues that occur in case of infection with g.results.supply hijacker and provides a complete guide on how to remove harmful files from the system and how to restore affected browsers. In case that you see the…

THREAT REMOVAL

Remove League of Legends Phishing Scam — How to Protect Yourself

This article has been created in order to explain to you what is the League of Legends phishing scam and how you can remove them as well as all potentially unwanted programs delivered through them. The League of Legends phishing…

THREAT REMOVAL

CommonRansom Virus – How to Remove It (+Restore Files)

This article will aid you remove CommonRansom virus effectively. Follow the removal instructions at the end. The CommonRansom virus is a newly discovered ransomware threat that does not belong to any of the known malware families. The identity of the…

THREAT REMOVAL

Remove Instagram Video Message Scam — How to Protect Yourself

This article has been created in order to explain to you what is the Instagram Video Message Scam and how you can remove them as well as all potentially unwanted programs delivered through them. The Instagram Video Message Scam is…

THREAT REMOVAL

Remove OneDrive Phishing Scam — How to Protect Yourself

This article has been created in order to explain to you what is the OneDrive Phishing Scam and how you can remove them as well as all potentially unwanted programs delivered through them. The OneDrive Phishing Scam are a set…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree