Home > Martin Beltov

Author Archive: Martin Beltov - Page 63

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

THREAT REMOVAL
Scarab-Osk virus image ransomware note .osk extension

Scarab-Osk Virus (Scarab Ransomware) – Remove and Restore .osk Files

The Scarab-osk virus is the newest descendant from the Scarab ransomware family. It follows the already established behavior tactics of the previous versions and renames the target data with the .osk extension. Its development shows that the computer hackers continue…

CYBER NEWS
Cosiloon Android Virus

Cosiloon Android Virus Discovered in at Least 140 Cheap Devices

Security experts discovered a dangerous malicious instance in Android devices. Yesterday one of the major anti-virus vendors announced that they have found that over 140 cheap Android devices that are being sold to customers include a threat known as the…

CYBER NEWS
ZipperDown vulnerability image

ZipperDown Vulnerability Affects About 10% of iOS Apps

Security experts discovered a dangerous bug that affects applications built for Apple’s mobile software infrastructure. According to the published information the ZipperDown vulnerability affects around 10% of all iOS apps released publicly. It is possible that this bug can function…

THREAT REMOVAL
JosepCrypt virus image ransomware note .josep extension

JosepCrypt Virus – Remove and Restore .josep Files

JosepCrypt virus is a newly discovered test version of a new threat. The security analysis reveals that it does not contain snippets from any of the famous malware families. It is possible that future versions of it are going to…

THREAT REMOVAL
search.hmytemplates.co redirect browser hijacker image

Search.hmytemplates.co Redirect Removal Guide

The article will help you to remove Search.hmytemplates.co fully. Follow the browser hijacker removal instructions given at the end of the article. The Search.hmytemplates.co redirect is a dangerous browser hijacker that has been uncovered in a recent attack campaign. It…

CYBER NEWS
Spectre Variant 4 Vulnerability screenshot sensorstechforum

CVE-2018-3639: Spectre Variant 4 Vulnerability Affects the Linux Kernel

A Spectre variant 4 vulnerability has been identified in the Linux kernel and represents a very dangerous threat to all affected machines. All system administrators are urged to apply the latest updates as soon as possible to mitigate any possible…

THREAT REMOVAL
Mr. Dec virus image

Mr. Dec Virus — How To Remove it and Restore Affected Data

The Mr. Dec virus has been discovered in a small attack campaign. While the initial strains do not feature advanced code it is expected that future versions will be much more dangerous. The affected files are renamed with random extensions,…

THREAT REMOVAL
Sigrun virus image

Sigrun Virus Removal Guide — How To Restore .sigrun Files

Sigrun virus is a newly discovered test version of a new threat. The security analysis reveals that it does not contain snippets from any of the famous malware families. It is possible that future versions of it are going to…

THREAT REMOVAL

WinstarNssmMiner Virus (Cryptocurrency Miner) — How To Remove it

This article has been created in order to explain what is the WinstarNssmMiner Trojan and how to remove this malware completely from your computer. The WinstarNssmMiner virus is a stealth Trojan that can infect computer networks and infiltrate both end…

THREAT REMOVAL

CryptoShuffler Trojan (Cryptojacking Virus) — How to Remove

This article has been created in order to explain what is the CryptoShuffler Trojan and how to remove this malware completely from your computer. The CryptoShuffler Trojan is a Cryptojacking virus that is capable of stealing cryptocurrency assets from the…

THREAT REMOVAL

Booknish Jigsaw Virus — How to Remove It and Restore .booknish Files

The Booknish Jigsaw Virus is the newest strain of the Jigsaw ransomware family. It uses a complex infection algorithm that can cause devastating damage to the infected hosts. Advanced versions of it can induce a Trojan-like behavior that can spy…

REVIEWS
Top 5 Server Motherboards for Q1 2018

Top 5 Server Motherboards for Q1 2018

Server motherboards are the essential components on top of which the machine is built. As the first quarter of the year has passed system administrators can finally start assembling new machines with the newer components. This guide will focus on…

REVIEWS

Top 5 Wireless Mobile Photo Printers in 2018 (Buyers Guide)

Smartphones, drones and other devices that can capture photos and videos are all around us which has made photography the most popular hobby in the world. As a consequence one of the most bought gifts for Christmas, birthdays and other…

THREAT REMOVAL

StalinLocker Virus — How to Remove It and Restore Your Files

The StalinLocker virus is a new ransomware that appears to be still in a testing phase of development. The initial strains associated with it have been featured in a small attack campaign. We expect to see newer versions of it…

CYBER NEWS

Google Continues to Spy on Gmail Email Messages

Google continues its practice of scanning the data of Gmail users even though the company announced that they would stop using the Gmail content of consumer users for ad personalization. This controversial practice has been sighted to continue due to…

THREAT REMOVAL

FBLocker Virus – Remove and Restore .facebook Files

The FBLocker virus is a new malware that does not originate from any of the known malware families. The collected samples so far are test versions and we expect to see forthcoming attacks with it. The virus engine encrypts target…

THREAT REMOVAL

Your Apple Account Has Been Limited Scam – How to Remove It

This article has been created in order to help you by explaining to you how to remove the Your Apple Account Has Been Limited scam which can be encountered via email messages. The Your Apple Account Has Been Limited Scam…

THREAT REMOVAL

ANDRZEJ DUPA Virus – Remove and Restore .CRAB Extension Files

ANDRZEJ DUPA virus is a ransomware that impersonates GandCrab by applying the .CRAB extensionto the affected files. The security analysis reveals that it merely imitates it and is likely that it will change over time. Read our in-depth removal guide…

THREAT REMOVAL

Searchsmart.website Redirect Removal Guide

The article will help you to remove Searchsmart.website fully. Follow the browser hijacker removal instructions given at the end of the article. The Searchsmart.website redirect is a dangerous browser hijacker that has been uncovered in a recent attack campaign. It…

THREAT REMOVAL

Remove Go.deepteep.com Redirect

The article will help you to remove Go.deepteep.com fully. Follow the browser hijacker removal instructions given at the end of the article. The Go.deepteep.com redirect is a dangerous browser hijacker that has been uncovered in a recent attack campaign. It…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree