Home > Martin Beltov

Author Archive: Martin Beltov - Page 67

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

CYBER NEWS
Microsoft Word image

Cryptocurrency Theft Now Possible via Microsoft Word Documents

Security analysts have reported a worrying new discovery — cryptocurrency theft is now possible due to a new feature added in Microsoft Word which allows users to embed multimedia elements. Microsoft have apparently tried to ease the creation of interactive…

THREAT REMOVAL

NazCrypt Virus – How to Remove & Restore .nazcrypt Extension Files

This article has been created in order to help you by explaining how to remove NazCrypt Virus virus from your computer system and how to restore .nazcrypt encrypted files. Computer security experts discovered a dangerous new malware known as the…

THREAT REMOVAL

Remove BananaCrypt Virus — Restore .bananaCrypt Files

This article has been created in order to help you by explaining how to remove BananaCrypt Virus virus from your computer system and how to restore .bananaCrypt encrypted files. The BananaCrypt virus is a test malware that has been spotted…

THREAT REMOVAL

Russenger Virus – How to Remove & Restore .messenger-%random% Files

This article has been created in order to help you by explaining how to remove Russenger Virus virus from your computer system and how to restore .messenger-%random% encrypted files. The Russenger virus is a newly discovered threat that contains a…

THREAT REMOVAL

DriedSister Virus – How to Remove & Restore .下物妹! Extension Files

This article has been created in order to help you by explaining how to remove DriedSister virus virus from your computer system and how to restore .下物妹! encrypted files. Security experts discovered a dangerous new malware threat called the DriedSister…

THREAT REMOVAL

Flow Crypter 4 Virus — How to Detect and Remove It from Your Computer

The Flow Crypter 4 virus is a dangerous malware instance that is currently being sold on the underground hacker markets. As a result of the virus infections the hacker controllers can sabotage the victim’s data. Flow Crypter’s main purpose is…

CYBER NEWS
Lazarus Group image

Lazarus Group Hackers Are Behind a Dangerous New Phishing Scam

The infamous criminal collective known as the Lazarus Group have been spotted behind a worldwide phishing scam. They are among the most experienced hacker groups that are infamous for coordinating mass attacks against high-end targets. The current campaign is focused…

THREAT REMOVAL
Surf-live.com redirect removal

Surf-live.com Removal Guide

The Surf-live.com redirect is a new browser hijacker that is actively being used to infect users worldwide. The malware code retrieves personal data from the victims and can institute additional threats to the compromised hosts. Surf-live.com – Delivery Techniques The…

THREAT REMOVAL
TOPHER Crypter virus image

Topher Crypter Virus — How to Detect and Remove It from Your Computer

The TOPHER Crypter virus is among the most dangerous hacking tools of late. It provides the most advanced infiltration options and can completely take over the victim computers leading to further virus infections. In the majority of cases may not…

THREAT REMOVAL

Blank Ransomware – How to Remove & Restore .blank Files

What Is Blank Ransomware? This article has been created in order to help you by explaining how to remove Blank Ransomware virus from your computer system and how to restore .blank encrypted files. The Blank ransomware is a newly discovered…

THREAT REMOVAL
remove Olympic Destroyer Virus Godjue strain

Olympic Destroyer Virus Removal

The 2018 Pyeongchang Winter Olympics cyber attack was found to be caused by a malware called the Olympic Destroyer Virus. The initial code analysis reveals that this is an advanced Trojan that recruits the impacted systems into a worldwide botnet…

CYBER NEWS
Computer Virus Design 2018

Computer Virus Design in 2018: Essential Malware Components

Computer viruses are rapidly evolving as hackers are devising new types of malware and delivery mechanisms. Despite the fact that most ordinary computer users perceive them as single executable files that execute a predefined script behavior, the current attack campaigns…

CYBER NEWS
Cryptocurrency miners image

Cryptocurrency Miners Infect Government Sites Worldwide

Cryptocurrency miners are some of the most dangerous malware that are currently being directed against targets worldwide. Attack campaigns carrying them have the capability of causing much damage to the target hosts. A recent uncovered exploit has led to the…

CYBER NEWS

Blockhain Abuse: Next-Generation Malware Practices

As more and more software developers start to rely on blockchain networks to start their future projects, so are the possibilities to intrude into the devised decentralized infrastructure. Computer hackers are actively seeking ways to weaken the security of the…

CYBER NEWS
Advanced Hacker Tools image

Advanced Hacker Tools — Underground Weapons of Mass Destruction

Computer criminals attempt to cause intrusions and damage networks of high-profile targets and millions of end users daily. However while most attacks rely on simple penetration testing and automated script attacks there are also advanced hacker tools that have the…

THREAT REMOVAL

MBRlock Virus — How to Remove + Restore Encrypted Files

The MBRlock virus is a dangerous ransomware that is able to corrupt the Master Boot Record (MBR) of the victim machines. It then extorts the victims to pay a ransomware fee. The infections can also cause a wide variety of…

THREAT REMOVAL

SlikDealer New Tab Removal Guide

Computer security experts uncovered a new ongoing attack campaign using the SlikDealer New Tab redirect as primary payload. The browser hijacker modifies essential settings on the most popular web applications and as a result redirects the users to a hacker-controlled…

THREAT REMOVAL

All In One Office Redirect Removal Guide

The All in One Office redirect is a browser hijacker that upon infection redirects the victims to a hacker-controlled page. It has the ability to steal sensitive data from the users and install other viruses as well. All in One…

THREAT REMOVAL
GloballySearch.com redirect removal

Globallysearch.com Redirect Removal Guide

The globallysearch.com redirect is a new browser hijacker that is actively being used to infect users worldwide. The malware code retrieves personal data from the victims and can institute additional threats to the compromised hosts. GloballySearch.com – Delivery Techniques GloballySearch.com…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree