Home > Martin Beltov

Author Archive: Martin Beltov - Page 72

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

REVIEWS

Which Are The Best Data Recovery Programs of 2017

Cheapest Plan 1 Cheapest Plan 2 Cheapest Plan 3 Cheapest Plan 4 Cheapest Plan 5 Cheapest Plan 6 Cheapest Plan 7 Cheapest Plan 8 Cheapest Plan 9 Cheapest Plan 10 Stellar Phoenix EaseUS DR Recuva GetDataBack Norton Utilities BitRecover OnTrack…

CYBER NEWS
Cobian Trojan image

Cobian Trojan Detected in Ongoing Hacker Attacks

Security researchers uncovered the Cobian Trojan which is an advanced computer virus capable of infiltrating whole computer networks. It appears that it is being spread in a series of hacker attacks attempting to compromise machines worldwide. Cobian Trojan Delivered in…

CYBER NEWS
Instagram phone using image

Instagram Security Bug Exploited By Hackers To Reveal Private Data

Experts warned that a bug in the popular Instagram social network has led to a privacy intrusion into celebrities personal data along with those of ordinary users. The incident was reported after a series of leaks and criminal activity that…

CYBER NEWS
Facebook virus image

Facebook Virus Detected in Ongoing Worldwide Attack

Security professionals detected a massive attack against Facebook users with a distinct virus that is being distributed via Google Chrome hacks and malicious tactics. The attack uses several stages of malicious JavaScript code that is injected into the browser. Social…

CYBER NEWS
Replacement touchscreens and malware image

Replacement Touchscreens Can Infect Smartphones with Malware

Computer security researchers from the Ben-Gurion University of the Negev report a new malware attack via replacement touchscreens. The experts report that it is possible for criminals to abuse repair services and embed malicious code using this technique. Related Story:…

CYBER NEWS
EngineBox malware image

EngineBox Malware Used in Attacks on Financial Institutions

Security researchers uncovered that a series of ongoing attacks using the EngineBox malware are targeting financial institutions in Brazil. The hackers use malicious spam messages to fool the companies into infecting their hosts with the dangerous threat. Related Story: Internal…

CYBER NEWS
SyncCrypt ransomware image

SyncCrypt Ransomware Spreads Via Worldwide Spam Wave

The SyncCrypt ransomware is a newly identified threat that is now being distributed in a worldwide spam attack wave. The hackers behind the threat coordinate template-based email messages that include payload files that lead to the dangerous infection. SyncCrypt Ransomware…

CYBER NEWS
MIcrosoft Office CVE-2017-0199 Exploit

Hackers Devise Microsoft Office Infections via CVE-2017-0199 Exploit

Computer hackers are now attempting to infect computers worldwide using a new method that employs the CVE-2017-0199 exploit. The attackers have devised a new method that abuses a function found in in the new releases of Microsoft Office. Related Story:…

THREAT REMOVAL
Searchererr.website redirect image

Searchererr.website Redirect Removal

A dangerous browser hijacker called Searchererr.website has been found to infect computer users worldwide. The victims report serious security and privacy issues when accessing the malicious service. It is linked with other criminal services that are used to harvest sensitive…

CYBER NEWS
Disdain Exploit Kit

Disdain Exploit Kit Is the Newest Hacker Toy

The Disdain Exploit Kit is a hacking utility that has recently been identified on the black markets possibly being a modified version of an older threat. It is available in several versions depending on the rent and the price is…

CYBER NEWS
Windows virus

WordPress Virus Attack Carries Dangerous EV Ransomware

The popular WordPress content management system is experiencing a new wave of hacker attacks. Security experts discovered that criminals are infecting hosted services with a WordPress virus called EV ransomware. It encrypts the site’s content in a way similar to…

CYBER NEWS
ShadowPad Backdoor image

NetSarang Apps Riddled with ShadowPad Backdoor

Security researchers discovered that many connectivity products made by NetSarang are infected with the ShadowPad backdoor. This was done in a hacker attack which allowed the criminals to intrude into the company’s servers and place malicious installers in the place…

CYBER NEWS
cybersecurity image

Cybersecurity Jobs: Career Options to Consider

If you have ever wondered what it’s like to work in an exciting new career path, then computer and information security is a potential choice. This articles explores some of the most popular career propositions along with the descriptions of…

THREAT REMOVAL
Search.hfreeliveradio.co image

Search.hfreeliveradio.co Redirect Removal

The article will help you to remove Search.hfreeliveradio.co effectively. Follow the browser hijacker removal instructions at the end of this article. A dangerous browser hijacker called Search.hfreeliveradio.co has been found to infect computer users worldwide. The victims report serious security…

THREAT REMOVAL
Findgofind.com home page

Findgofind.com Redirect Removal

The article will help you to remove Findgofind.com effectively. Follow the browser hijacker removal instructions at the end of this article. A dangerous browser hijacker called Findgofind.com has been found to infect computer users worldwide. The victims report serious security…

CYBER NEWS

WikiLeaks Exposes CouchPotato CIA Spying Tool in a New Vault 7 Leak

Yesterday WikiLeaks exposed another utility from the Vault 7 software collection known as the CouchPotato spying tool. It is used by the intelligence agency to spy on Internet video streams which is a serious privacy invasion. Related Story: CIA Spies…

CYBER NEWS
SonicSpy Android Spyware image

SonicSpy Android Spyware Generates over 1000 Apps

Security experts identified that the SonicSpy Android Spyware is being used to generate a lot of malicious apps for the mobile operating system. In several months time the hackers have been able to create over 1000 virus instances, some of…

CYBER NEWS
Magnitude Exploit kit Attacks With Cerber ransomware image

Magnitude Exploit Kit Used for Cerber Ransomware Hacker Attacks

Cyber security researchers identified that the Magnitude exploit kit is being used to spread Cerber ransomware samples worldwide. The hackers behind the large-scale campaign are using a different strategy with the hope of increasing the infection ratio. Cerber Ransomware Hacker…

CYBER NEWS
Mamba ransomware featured image

Large-Scale Mamba Ransomware Attacks on the Rise Again

The notorious Mamba ransomware that paralyzed the the San Francisco Municipal Transportation Agency back in 2016 has resurfaced. This time the criminals behind the the large-scale attacks have refocused their attention on corporations around the world. Mamba Ransomware Reactivated Once…

CYBER NEWS
Linux Security Questions image

Top 15 Linux Security Questions You Didn’t Know You Had

Beginner Linux administrators and users should know that even though the operating system is deemed secure, there are many pitfalls and details to consider. Linux security may be there by default but the various distributions may opt to enable certain…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree