Home > Martin Beltov

Author Archive: Martin Beltov - Page 71

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

CYBER NEWS
Microsoft Office image

Old Microsoft Office Feature Can Be Used to Launch Virus Attacks

An old Microsoft Office can be used as an effective way to launch malware attacks against users worldwide. The discovery has been made by a team of security researchers that identified the hacker strategy. Related Story: Hackers Devise Microsoft Office…

CYBER NEWS
DoubleLocker android ransomware image

DoubleLocker Is an Android Ransomware That Locks down Victim Devices

Mobile users beware, the DoubleLocker Android ransomware can encrypt victim devices and change the associated PIN codes. At the moment a global attack wave is targeting mobile users using different delivery tactics. DoubleLocker Android Ransomware Detected Researchers from leading anti-virus…

CYBER NEWS
Cryptocurrency Miners image

Millions of Computers Infected with Cryptocurrency Miners

Reports indicate that a new hacker attack wave is being used against computer victims worldwide by distributing cryptocurrency miners via malicious scripts on websites. One of the most famous examples are some of the mirrors of the Pirate Bay torrent…

CYBER NEWS

6,300 Dark Web Marketplaces Are Selling Ransomware

Computer security researchers identified that the current prices of most Dark Web ransomware strains are becoming higher as beginner hackers flock to custom-made solutions. Dark Web Ransomware Is in High Demand In the last few years ransomware viruses are one…

CYBER NEWS

Ichidan Search Engine Is a Popular Tool for Dark Web Surfers

The Ichidan Dark Web search engine which can be found on the Dark Web is becoming and more popular as users of all types flock to it. The site has become a popular destination for ordinary users, hackers and security…

CYBER NEWS
ATMii ATM Virus image

The ATMii ATM Virus Steals Money from Machines Worldwide

Security experts identified a new attack wave with the ATMii ATM virus that has spread worldwide. The malware has undergone a thorough analysis by the experts and is rapidly being distributed by criminals on a global scale. ATMii ATM Virus…

CYBER NEWS

The 10 Most Bizarre Things Done for Cybersecurity

Cybercrime is one of the biggest threats to both individual users and businesses worldwide. As experts globally are trying to protect their networks from intrusions and abuse, sometimes the use of unusual methods is applied for the sake of keeping…

HOW TO

How to Secure Your Bitcoin Wallet: Security Essentials

Keeping the Bitcoin digital currency in a wallet file or a specialized online service has its risks. As the new system is being embraced by both customers and businesses, its popularity and acceptance continues to grow at an exponential rate.…

CYBER NEWS
Mac OS X High Sierra image

Apple Patch Remedies Critical High Sierra Vulnerability (CVE-2017-7149)

Apple released an emergency update that fixed a critical bug affecting the High Sierra operating system, specifically in the APFS volume management system. . According to security reports and the company a bug allowed the passwords to be revealed via…

CYBER NEWS
Office 365 image

Office 365 Corporate Emails Targeted in KnockKnock Hacker Campaign

Office 365 users, especially corporate accounts, are currently being targeted by hackers as part of a global hacker attack campaign called KnockKnock. The criminals are targeting the Exchange online servers of major companies in different sectors worldwide. The KnockKnock Attack…

CYBER NEWS
Windows Defender image

Windows Defender Antivirus Bypass Technique Identified

Computer security experts discovered a way to bypass the Windows Defender antivirus protection during an in-depth audit application audit. This allows hackers to seek out similar potential intrusion paths in order security software. Microsoft’s Own Windows Defender Antivirus Found Insecure…

CYBER NEWS

Your Privacy on Facebook ‒ the Tipping Point of All Trouble

Facebook has gained a lot of media attention and expert attention as another rise of critism against the social networks has appeared. The recent comments coming from Russia that the state is planning to block the service sparked a new…

THREAT REMOVAL
Mytransitguide redirect image

Remove Mytransitguide Redirect

A dangerous browser hijacker called Mytransitguide has been found to infect computer users worldwide. The victims report serious security and privacy issues when accessing the malicious service. It is linked with other criminal services that are used to harvest sensitive…

CYBER NEWS
MongoDB virus attacks image

MongoDB Virus Attack Impacts Databases Worldwide

Computer security experts detected a worldwide MongoDB servers virus attack that has impacted web applications and sites to malfunction on a global scale. Related Story: Instagram Security Bug Exploited By Hackers To Reveal Private Data MongoDB Virus Attack Launched Globally…

CYBER NEWS

How to Start a Secure Blog: Your Must-Do Checklist

Are you a seasoned blogger or a beginner enthusiast? Whether or not you have already gathered a wide audience or are planning to start your blog, a secure place to host it is one of the most important factors for…

CYBER NEWS
Android toast overlay attack

Android Toast Overlay Attack Affects Million of Users (CVE-2017-0752)

Last week mobile security experts notified the public about a new attack using the newly-discovered Android Toast overlay exploit. The security issue that was found to be the main culprit is an overlay type of attack that is being exploited…

CYBER NEWS
Equifax hack image

143 Million Social Security Numbers Stolen via Equifax Hack

Millions of American citizens will find that their social security numbers were stolen due to a critical Equifax Hack. The security breach affected one of the largest credit reporting companies operating in the USA. As a result of the malicious…

CYBER NEWS
Flag of China image

China Aspires to Dominate Artificial Intelligence Development

Business and government entities in China are rapidly involved in the use of facial recognition technologies powered by artificial intelligence systems. The mass deployment of such instances are changing the way citizens interact with the world and it paves the…

REVIEWS

Which Are The Best Data Recovery Programs of 2017

Cheapest Plan 1 Cheapest Plan 2 Cheapest Plan 3 Cheapest Plan 4 Cheapest Plan 5 Cheapest Plan 6 Cheapest Plan 7 Cheapest Plan 8 Cheapest Plan 9 Cheapest Plan 10 Stellar Phoenix EaseUS DR Recuva GetDataBack Norton Utilities BitRecover OnTrack…

CYBER NEWS
Cobian Trojan image

Cobian Trojan Detected in Ongoing Hacker Attacks

Security researchers uncovered the Cobian Trojan which is an advanced computer virus capable of infiltrating whole computer networks. It appears that it is being spread in a series of hacker attacks attempting to compromise machines worldwide. Cobian Trojan Delivered in…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree