Home > Martin Beltov

Author Archive: Martin Beltov - Page 74

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

CYBER NEWS

Ovidiy Stealer Is the New Hit Malware Sold for 7 Dollars

A newly discovered malware has captured the interest of both security experts and computer hackers. It is called the Ovidiy Stealer and it is being sold on underground hacker markets for a price as low as 7 US Dollars. It…

CYBER NEWS
The Most popular hacking tools in 2017 cover image

The Most Popular Hacking Tools in 2017

Computer criminals constantly attempt to break in to user and company devices and networks. And while this process may seem like wizardry, in most cases they actually use sophisticated software and code. Our article aims to showcase the most popular…

CYBER NEWS

GhostCtrl Android Virus – Spying Users Worldwide

Security engineers identified the GhostCtrl Android virus family that has the ability to spy on the users at all times. The malicious code contains a fully-featured surveillance module that can record and transmit audio, video, screenshots and other sensitive data…

CYBER NEWS

Twitter Adult Content Spam Spreads via New Botnet Attack

Over the past few months security experts identified a large-scale Twitter Adult Content Spam botnet attack. The instance is being used to generate and operate thousands of fake accounts that feature links leading to an affiliate network. Related Story: Twitter…

CYBER NEWS

CIA HighRise Android Malware – An Effective Spying Tool

WikiLeaks reported that the CIA is involved in the creation and coordination of a dangerous Android malware called HighRise. The report showcases the full features of HighRise as well as a copy of the Users Guide. Related Story: BothanSpy, Gyrfalcon…

CYBER NEWS

Kali Linux – This Is What You Need to Know Before You Start

Kali Linux is one of the most famous and widely used Linux distributions for security testing, digital forensics and penetration testing. It has grown in popularity so fast that it is now perceived as an essential part of every security…

CYBER NEWS
shutterstock_385561282

Linux Security Basics: What System Administrators Need to Know

Every new Linux system administrator needs to learn a few core concepts before delving into the operating system and its applications. This short guide gives a summary of some of the essential security measures that every root user must know.…

CYBER NEWS
iot-security-environment-stforum

Security Tips for Configuring IoT Devices

Are you thinking of buying a new Internet of Things (IoT) device or you already own such an appliance? You might have heard of the risks attributed to these products, this is just one of the reasons why owners and…

THREAT REMOVAL
shutterstock_152253701

Remove Centurion_Legion@aol.com .XTBL Ransomware

One of the many ransomware variants of the Shade/Troldesh family is called Centurion_Legion@aol.com. This is a recently discovered version that has started to plague computer users worldwide. It uses an advanced encryption algorithm to store most user files and folders…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree