Home > Martin Beltov

Author Archive: Martin Beltov - Page 73

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

CYBER NEWS
WannaCry global ransomware infections image

WannaCry August Update ‒ Ransom Sums Collected and Slayer Arrested

The security community reported two major incidents connected to the infamous WannaCry ransomware that hit computers worldwide about a month ago. The operators behind it have managed to collect the ransom sums. At the same time the expert who shut…

CYBER NEWS

Rurktar Malware Discovered – Spying Tool Under Development

Security researchers uncovered the Rurktar Malware family, a compendium of several virus strains that are currently being developed. As the security analysis is still ongoing we expect to see hacker attacks using the Rurktar malware in the coming weeks. Rurktar…

CYBER NEWS
Stantinko Malware image

In-Depth Analysis of the Stantinko Malware – How to Protect Yourself

The infamous Stantinko malware family has turned out to be a menace to European countries. Computer hackers are using the dangerous virus to infect computers on a mass scale. According to the latest data about 4 million computers in Moscow…

CYBER NEWS
SLocker Android Ransomware Image

SLocker Android Ransomware – In-Depth Analysis and Prevention Tips

Security engineers discovered that the SLocker Android ransomware family code base has been published in a decompiled (raw) form. This allows every hacker This is a prominent threat that has produced many strains ever since its first iteration. SLocker Android…

THREAT REMOVAL
Search.searchwamtv.com Redirect image

Search.searchwamtv.com Redirect Removal

The article will help you to remove Search.searchwamtv.com effectively. Follow the browser hijacker removal instructions at the end of this article. The Search.searchwamtv.com redirect is a malicious web site that can infect the victims with different computer viruses. Interacting with…

THREAT REMOVAL
FileShareFanatic site image

FileShareFanatic Browser Hijacker Removal Guide

The article will help you to remove FileShareFanatic effectively. Follow the browser hijacker removal instructions at the end of this article. FileShareFanatic is malicious browser extension (also known as a hijacker) that misconfigures key web browser settings and can cause…

CYBER NEWS
IP Cameras image

Popular IP Cameras Vulnerable to Hacker IoT Attacks

Security vendors discovered that popular IP Cameras are vulnerable to dangerous remote exploits and IoT hacker attacks that can result in device abuse. Related Story: Persirai IoT Malware Exploits CVE-2017-8224, Known Vulnerabilities Ip Cameras Once Again Threatened By a Lack…

THREAT REMOVAL
Fpagesnews.net redirect image

Fpagesnews.net Redirect Removal

The article will help you to remove Fpagesnews.net effectively. Follow the browser hijacker removal instructions at the end of this article. The Fpagesnews.net redirect is a malicious web site that can infect the victims with different computer viruses. Interacting with…

CYBER NEWS
Amazon Echo image

Amazon Echo Malware Can Spy оn Users аt All Times

Security experts demonstrated that an Amazon Echo malware can be used to institute a 24/7 surveillance mode onto the victims by accessing the device’ hardware. Related Story: Cortana Is Not Your Friend but Your Enemy, and Here’s Why Amazon Echo…

CYBER NEWS
BrickerBot Malware image

BrickerBot Malware Attack Crippled Over 60 000 Devices in India

A large-scale attack caused by the BrickerBot malware affected over 60 000 Internet devices in several states in India. This is a follow-up campaign that is operated by security criminals to take down IoT devices worldwide. Related Story: Bricker Malware…

THREAT REMOVAL
a9t9.com/copyfish redirect image

Remove a9t9.com/copyfish Redirect

This article will aid you to remove a9t9.com/copyfish fully. Follow the browser hijacker removal instructions at the end of the article. a9t9.com/copyfish is the URL address for one of the famous browser hijackers known simply as “Copyfish”. The main website…

CYBER NEWS
Svpeng Android malware image

SvPeng Android Malware Spies on Your Banking Services and Your Files

A new modification of the Svpeng Android malware has just been reported by security experts. It is able to steal sensitive information from the infected devices and includes a lot of advanced features. Related Story: Lipizzan Android Malware Could Spy…

CYBER NEWS
CIA Spying on Users image

CIA Spies on Mac OS X and Linux via Achilles, SeaPea and Aeris Tools

Wikileaks revealed 3 more spyware documents originating from the CIA Vault 7 leaks. The release is part of a project called “Imperial” that includes three advanced hacking tool used to spy on users worldwide. They are called Achilles, SeaPea and…

CYBER NEWS
Trickbot banking trojan image

TrickBot Banking Trojan Updated: WannaCry-Inspired Module Now Active

Security researchers uncovered a new version if the infamous TrickBot banking Trojan that has been used extensively to carry out infection campaigns and elaborate scams. The new iteration now includes a worm-like module that is reminiscent of the WannaCry ransomware.…

CYBER NEWS

Lipizzan Android Malware Could Spy on Users in Real Time

Google announced that the company is now blocking a newly identified Android malware family called Lipizzan. The security specialists identified several virus strains that are spread on the Google Play store and third-party repositories. The Lipizzan Android malware family contains…

CYBER NEWS
Kaspersky Free Edition Antivirus image

Kaspersky Free Edition Antivirus Now Available for Download

There is a new contender among security protection software – the Kaspersky Free edition antivirus has been released to the general audience. It is available for Microsoft Windows users for a year as an extended trial version of the core…

CYBER NEWS
CowerSnail Linux Virus image

CowerSnail Linux Virus Connected to SambaCry CVE-2017-7494

Security researchers detected the CowerSnail Linux virus in an ongoing investigation into large-scale hacker attacks. According to the analysis the criminals behind the malware are also responsible for the SambaCry Trojans that exploit the CVE-2017-7494 vulnerability. Related Story: The Best…

CYBER NEWS
AVPASS Android Hacking Tool Presentation Image

AVPASS Android Hacking Tool Evades Antivirus Detection

Security researchers demonstrated a powerful Android hacking tool called AVPASS that is able to evade detection from almost all mobile antivirus software. A mass demonstration is scheduled at the annual Black Hat USA conference during the briefings that are going…

REVIEWS
Internet Web (WWW) image

Going Underground: How the Dark Web and Deep Web Work

Over the past few years the TOR hidden network and other related services have been featured prominently on the news as part of the so-called Dark Web or Deep Web. There is a large difference between these three computer networks.…

REVIEWS
Debian Linux Server screenshot image

The Best Linux Server Distributions in 2017

Gnu/Linux is one of the leading server operating systems due to its ability to be adapted to different devices and architectures. When faced with the decision to implement a server on your home or company network, probably one of the…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree