Home > Martin Beltov

Author Archive: Martin Beltov - Page 62

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

THREAT REMOVAL

Remove Repair_data@cryptmail.com Virus (Xorist) – Restore Files

This article has been created in order to help you by explaining to you how to remove the Repair_data@cryptmail.com virus which can be encountered via email messages. The Repair_data@cryptmail.com virus is the newest strain of the Xorist ransomware family. Like…

THREAT REMOVAL

SocketPlayer Trojan Removal — Restore Your PC From Infections

This article has been created in order to explain what is the SocketPlayer Trojan Trojan and how to remove this malware completely from your computer. The SocketPlayer Trojan is a newly discovered virus that is incorporated into two variants. An…

CYBER NEWS
DNS Amplifications Attacks

Reports Indicate Growth of DNS Amplification Attacks In Q1 2018

A security report reveals that the number of DNS Amplification attacks done in the first quarter (Q1) of 2018 have doubled. By definition they are a type of DDOS (Distributed denial of service) attacks which are among the most common…

CYBER NEWS
MirageFox image

MirageFox Malware: the Latest Addition to APT15 Hack Arsenal

The APT15 hacking group which became well-known for its high profile attacks against US Military has developed a new dangerous malware tool called MirageFox. It is believed that it is an updated version of previously-released threats. A detailed technical analysis…

CYBER NEWS
SigSpoof PGP bug image

CVE-2018-12020: SigSpoof PGP Bug Allows Hackers to Spoof Signatures

The SigSpoof PGP Bug has been discovered to be a decade-old threat that allows hackers to spoof any user’s signatures and identity. This is a rare instance where a security issue has been available for many years and the vulnerability…

CYBER NEWS
Microsoft logo image

Here’s Why Microsoft Leaves Some Vulnerabilities Unpatched

Microsoft has revealed their plans for patching exploits and how they are being handled by their security team. The details are outlined in a draft that reveals how the Microsoft Security Response Center will react according to the different severity…

CYBER NEWS
MysteryBot Android Trojan image sensorstechforum com image

Android Users Beware: MysteryBot Trojan Can Encrypt Your Files

Security researchers have spotted another dangerous threat that is being targeted at mobile users. The MysteryBot Android Trojan is the latest offensive tactic against mobile devices as it is being launched on a global scale. It is rated as a…

CYBER NEWS
Amazon Fire

Amazon Fire TV and Fire TV Stick Miner Infections on the Rise

Following the large number of viruses that are being developed for Android and iOS devices we have received reports that a large number of Amazon Fire TV and Fire TV Stick devices are being targeted by cryptocurrency miners. The hackers…

CYBER NEWS

KB4284835 Update: Windows 10 Build 1803 Patched to Version 17134.112

Microsoft has released the latest Windows patch bulletin in the KB4284835 update. This updates Windows 10 from build 1803 to OS build 17134.112. This fixes a total of 50 security patches and brings other improvements to the software. KB4284835 Updates…

CYBER NEWS
Apple image

Apple Bans Cryptocurrency Miners from the App Store

Apple has started restricting the inclusion of cryptocurrency miners from its App Store. The company is doing this in the hope of protecting computer users from malicious instances. The majority of miner code available on these software repositories may be…

CYBER NEWS
Google Chrome extensions

Google Chrome Will Block Third-Party Site Extensions Installation

Forthcoming versions of the Google Chrome browser will block the installation of extensions outside of the Chrome Web Store. This was announced by the company in an official blog post yesterday. The step is being made in order to protect…

THREAT REMOVAL
Instasrch.com redirect browser hijacker image

Instasrch.com Redirect Removal — How To Restore Your Browser

The article will help you to remove Instasrch.com fully. Follow the browser hijacker removal instructions given at the end of the article. The Instasrch.com redirect is a browser hijacker that has recently been discovered by the security community due to…

THREAT REMOVAL
B4WQ Virus image ransomware note .B4WQ extension

Remove B4WQ Virus (B2DR Ransomware) – Restore .B4WQ Files

The B4WQ virus is ransomware that is descendant from the earlier B2DR threat. Like its parent it uses a modular engine that seeks to encrypt sensitive personal files. Our article explores the technical aspect of the infections and shows how…

THREAT REMOVAL

Remove The .IQY Virus & Restore Your PC From Infections

This article has been created in order to help you by explaining to you how to remove the .IQY Virus which can be encountered via email messages. The .IQY virus is a very dangerous malicious threat that incorporates an advanced…

THREAT REMOVAL
Donut Virus image ransomware note .donut extension

Remove Donut Virus (Hidden Tear Ransomware) – Restore .donut Files

The Donut virus is a new descendant of the Hidden Tear ransomware family. Each individual attack can be configured so that it targets the targets specifically. Refer to our in-depth article for a technical analysis and full removal instructions. Donut…

THREAT REMOVAL

IceID Trojan – How to Remove It and Protect Your Network

This article has been created in order to explain what is the IcedID Trojan and how to remove this malware completely from your computer. The IceID Trojan is an advanced banking Trojan that is being used in large-scale attacks across…

THREAT REMOVAL

Instagram Scam Guide — How to Detect and Evade Them

This article has been created in order to help you by explaining to you how to remove the Instagram Scam which can be encountered via email messages. Our Instagram scam guide reveals all popular social engineering tactics that are used…

THREAT REMOVAL

BackSwap Trojan — How to Remove it From Infected Hosts

This article has been created in order to explain what is the BackSwap Trojan and how to remove this malware completely from your computer. The BackSwap Trojan is a dangerous virus that has successfully hijacked hundreds of computers. In our…

THREAT REMOVAL

TSB Phishing Scam– How to Remove Active Infections

This article has been created in order to help you by explaining to you how to remove the TSB Phishing Scam which can be encountered via email messages. The TSB phishing scam is a recent example of a large-scale campaign…

THREAT REMOVAL

Grobios Trojan — How to Remove Active Infections from Your PC

This article has been created in order to explain what is the Grobios Trojan and how to remove this malware completely from your computer. The Grobios Trojan is a dangerous virus threat that has recently been identified in a hacker…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree