Home > Martin Beltov

Author Archive: Martin Beltov - Page 65

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

THREAT REMOVAL

.Tron Virus (Tron Ransomware) – Remove + Restore Files

Tron Virus is a newly discovered malware instance that appears to be made by an unknown hacker or criminal group. The security researchers propose that future attacks might implement newer versions of the malware engine. Tron virus – Infection Spread…

THREAT REMOVAL

Remove Spartacus Virus and Restore .Spartacus Files

Spartacus Virus is a newly discovered malware instance that appears to be made by an unknown hacker or criminal group. The security researchers propose that future attacks might impement newer versions of the malware engine. Spartacus virus – Infection Spread…

THREAT REMOVAL

FunSocialTabSearch Redirect Removal Instructions

The article will help you to remove FunSocialTabSearch fully. Follow the browser hijacker removal instructions given at the end of the article. The FunSocialTabSearch is made by IMALI – N.I. MEDIA LTD., a company well-known for creating whole networks of…

THREAT REMOVAL

CryptoPriceSearch Redirect Removal Instructions

The article will help you to remove CryptoPriceSearch fully. Follow the browser hijacker removal instructions given at the end of the article. The CryptoPriceSearch is made by Mindspark, a company well-known for creating whole networks of threats. This particular redirect…

THREAT REMOVAL

How to Remove the TaxCenterNow Redirect and Restore Your Browser

The article will help you to remove TaxCenterNow fully. Follow the browser hijacker removal instructions given at the end of the article. The TaxCenterNow is made by Mindspark, a company well-known for creating whole networks of threats. This particular redirect…

CYBER NEWS
HTTP Injector image

HTTP Injector Attacks Harvest Mobile Data Connections

Computer security researchers uncovered a new malware tactic that uses a HTTP injector attack capable of harvesting mobile data connections. The criminals are actively using this strategy to gain free Internet access. HTTP Injector Attack Method Revealed Related Story: TeleRAT…

CYBER NEWS
SirenJack Attack image

SirenJack Attack Abuses Emergency Alert Systems

Computer hackers have uncovered a way to abuse the emergency alert services in an attack called SirenJack. This was made possible due to a newly discovered vulnerability in one of the vendors. An Ongoing SirenJack Attack Can Cause Widespread Panic…

THREAT REMOVAL

SkyFile Virus – How to Remove It and Restore .sky Files

The SkyFile virus is a new test version malware that is actively being spread towards computer users worldwide. A preliminary code analysis does not reveal a correlation with any of the famous malware engines. The affected files are renamed with…

THREAT REMOVAL

Horros Virus – Remove and Restore .horros Files

Horros virus is a new Hidden Tear based malware that is actively infecting computers worldwide. Read our in-depth removal guide in order to learm more about it and recover your computer. Horros virus – Infection Spread The Horros virus can…

THREAT REMOVAL

Оkaytab.com Redirect Removal Guide

The okaytab.com redirect has been found to infect many users through browser-based addons. It is possible to manipulate them into delivering malware code of different kind. Computer users are also warned of the advanced data gathering which is used to…

THREAT REMOVAL

Vurten Virus – Remove and Restore .improved Files

Vurten virus is a new ransomware that has recently been discovered by virus researchers, it encrypts target data with the .improved extension. At the moment the collected so far samples seem to be test versions of the malware. Further updates…

CYBER NEWS
LinkedIn phishing image

LinkedIn Phishing Scams — How to Spot and Evade Spam Emails

A security team has detected ongoing LinkedIn phishing attacks that aims to infect users worldwide. Further information about the threat is given in this article. LinkedIn Phishing Attacks Unleashed By Unknown Hackers A security research team has discovered a series…

THREAT REMOVAL

Dont_Worry Virus – How to Remove It and Restore Encrypted Files

The Dont_Worry virus is a newly discovered ransomware, part of the AMBA malware family. Read our in-depth removal guide to learn how to get rid of the infection and restore the affected data. Dont_Worry Virus – Infection Spread The Dont_Worry…

CYBER NEWS
CVE-2018-6849 webrtc exploit image

Hackers Exploit Software into Sharing Data Via WebRTC (CVE-2018-6849)

The security community has discovered a dangerous exploit that allows computer criminals to exploit VPN connections and private browsers thereby accessing sensitive data. VPN Software & Browsers Vulnerable to WebRTC Exploit The security community has discovered a dangerous exploit that…

CYBER NEWS
HiddenMiner Android Miner image

HiddenMiner Android Miner May Cause Device Failure

A new Android miner called “HiddenMiner” has been discovered by security researchers. It is a dangerous malware that has the potential to cause imminent device failure. Discovery of the HiddenMiner Android Miner A team of security experts uncovered a dangerous…

THREAT REMOVAL

.MOLE66 Ransomware Virus (CryptoMix) — How to Restore Files

The MOLE66 virus is the newest variant of the Cryptomix malware family. It was recently discovered in an ongoing attack campaign that is spread using different methods. Once it has compromised a target computer it would encrypt the users data…

THREAT REMOVAL

BansomqareWanna Virus – How to Remove it and Restore .bitcoin Files

The BansomqareWanna virus is a typical ransomware that causes system changes and encrypts target user data with the .bitcoin extension. Read our removal guide to find out more about it. BansomqareWanna Virus – Infection Spread The BansomqareWanna virus can be…

THREAT REMOVAL

B2DR Virus – How to Remove it and Restore .b2dr Data

The B2dr virus is a newly discovered ransomware that appears to be an original invention and not based on any of the known malware families. It targets sensitive user data, encrypts it with the .b2dr extension and extorts the victims…

THREAT REMOVAL

Scarab-please Virus (Scarab Ransomware) – Remove and Restore .please Files

A new iteration of the Scarab malware family has been identified — the Scarab-virus. It is a classic example of a ransomware that has the ability to encrypt target data and extort the victims for a payment. Scarab-Please Virus –…

CYBER NEWS
malware android apps image

Malicious Android QR Reader Apps Downloaded More Than 500K Times

Security researchers discovered that a new Android malware strain has plagued the Google Play Store. According to the released information more than 500K downloads of the virus have been initiated. The target applications that sever as the payload delivery mechanism…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree