Home > Martin Beltov

Author Archive: Martin Beltov - Page 52

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

CYBER NEWS

ASRock Drivers Found to Contain Several Vulnerabilities: Patch Now!

A team of security researchers detected that several ASRock drivers feature multiple dangerous vulnerabilities. Following the announcement the vendor issued patches fixing the bugs. All ASRock clients are advised to update their drivers and associated software to the latest available…

CYBER NEWS

CVE-2018-14665: Xorg Vulnerability Affects Both Linux and BSD Systems

Linux and BSD systems face a critical risk as a Xorg vulnerability has been found. This is the main display server which is used to provide the graphics engine. The issue is tracked in the CVE-2018-14665 advisory and is related…

CYBER NEWS

New Versions of the Mirai Botnet Detected: Work Attributed to Independent Hackers

Two years following the worldwide Mirai botnet attack criminals worldwide are utilizing it for various malicious uses. Recently security experts discovered that several new versions of it have been developed. An in-depth look shows that the new releases are the…

THREAT REMOVAL

Remove GiffySocial Browser Hijacker

The article will aid you to remove GiffySocial completely. Follow the browser hijacker removal instructions provided at the bottom of this article. GiffySocial is a browser hijacker redirect developed by the MindSpark. Its website will redirect you to its search…

THREAT REMOVAL
Remove SearchAwesome Mac Adware — Mac Restore Instructions

Remove SearchAwesome Mac Adware — Mac Restore Instructions

This article has been created in order to give you insight on how to quickly remove the SearchAwesome Mac Adware from your Mac effectively. The SearchAwesome Mac Adware is a very dangerous threat to all Mac computers as it can…

CYBER NEWS

Wife Lovers Adult Site Hacked: 1.2M Users Data Leaked

The Wife Lovers adult site has been hacked and as a result of this incident the data of of 1.2 million users has been leaked. The reason for this is an outdated hashing technique and an overall weak security implementation.…

CYBER NEWS

Windows Zero-Day Revealed on Twitter, Microsoft Data Sharing Service Affected

A new zero-day Windows vulnerability has been disclosed via the Twitter social network. According to the information released by the security researcher the problem lies within the Microsoft Data Sharing service. It is used to allow data sharing between applications.…

CYBER NEWS

Newly Discovered Chalubo Botnet Used as a DoS Weapon

The Chalubo botnet is a recently discovered malware which has been found to contain advanced features from other threats and being used for DoS (denial-of-service) attack campaigns. At the moment several attacks have been sighted. Our article gives an overview…

THREAT REMOVAL

Remove FreeShoppingTool Browser Hijacker

The article will aid you to remove FreeShoppingTool completely. Follow the browser hijacker removal instructions provided at the bottom of this article. FreeShoppingTool is a browser hijacker redirect developed by the MindSpark. Its website will redirect you to its search…

HOW TO

How to Clean up Cache, Cookies and History on Opera

The Opera web browser may not be the most widely used browser but it is still adopted by millions of users. According to StatsCounter, Opera is used by 3,38% of users which makes it more popular than Internet Explorer, for…

HOW TO

How to Clean up Cache, Cookies and History on Google Chrome

То effectively clean junk files and free empty space, users can clean up their cache, cookies and history stored in the Google Chrome web browser. While this may sound hard for some users, our in-depth instructions show how this can…

HOW TO

How to Clean up Cache, Cookies and History on Mozilla Firefox

Cleaning up cache, cookies and history on Mozilla Firefox is an easy task when following our instructions. These steps will allow you to remove any excessive information, junk data and free up disk space. Step 1: Accessing the Options Page…

CYBER NEWS

A Multitude of Freertos Security Bugs Allow Hackers to Abuse Iot Devices

The FreeRTOS operating system widely used by IoT devices can be abused by computer hackers to take down the instances. A team of security researchers recently announced that it contains many bugs allowing hackers numerous pathways to the target IoT…

CYBER NEWS

Healthcare.Gov Breached, 75 000 Users Affected by Data Theft

Unknown computer hackers have breached the HealthCare.gov sign-up system and hijacked the personal data of about 75 000 users. This site hosted the service called Federally Facilitated Exchanges (FFE) and is used for healthcare insurance use. An official government announcement…

CYBER NEWS

CVE-2018-4013: MPlayer and VLC Both Affected by a Critical Vulnerability

A security researcher has announced the discovery of a critical vulnerability in two of the most popular media players — MPlayer and VLC. The issue was found in the LIVE555 media streaming library which is used in both applications and…

CYBER NEWS

CVE-2018-7600 Drupal Bug Used in New Attack

Computer hackers are abusing the CVE-2018-7600 Drupal vulnerability using a new exploit called Drupalgeddon2 to take down sites. The attacks target site instances running versions 6,7 and 8 of Drupal and use the same security vulnerability which was addressed back…

CYBER NEWS

Cryptocurrency Miners Infect Thousands of PCs Via Fake Adobe Flash Update

A new large-scale campaign against computer users worldwide has been uncovered to plant cryptocurrency miners via a fake Adobe Flash Update. The security report indicates that the criminals have shifted the tactic of distributing ransomware to cryptocurrency miners using this…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree