Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 122

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS

Ransomware Goes Phishing to Steal PayPal Credentials

Ransomware is usually after one thing only, and that’s encrypting the victim’s data and extorting payment for its decryption. However, a new piece of ransomware which is still in a development stage adds something else to its malicious activity –…

CYBER NEWS

New Hacking Methods to Look Out for in 2019

The number of individuals affected by data breaches and cyberattacks in 2018 is definitely in the billions, and organizations are not far behind, either. One data breach alone, [wplinkpreview url=”https://sensorstechforum.com/500-million-customers-marriott-starwood-data-breach/”]Marriott’s, affected 500 million individuals! More specifically, Starwood subsidiary’s guest reservation…

CYBER NEWS
Microsoft logo image

KB4480960 and KB4480970 Causing Issues on Windows 7

KB4480960 and KB4480970 are two security updates published by Microsoft in January 2019 Patch Tuesday. The updates are for Windows 7 SP1 and Windows Server 2008 R2 SP1, and as evident by multiple complaints by users, they are causing troubles.…

CYBER NEWS

CVE-2018-15453 Vulnerability Affects Cisco AsyncOS

A serious security vulnerability, identified as CVE-2018-15453, in Cisco AsyncOS. More precisely, the vulnerability is located in the Secure/Multipurpose Internet Mail Extensions (S/MIME) Decryption and Verification or S/MIME Public Key Harvesting features of Cisco AsyncOS Software for Cisco Email Security…

CYBER NEWS

How to Spoof Google Search Results Using Knowledge Graph

A flaw was just discovered in Google’s Knowledge Graph, which makes it possible to manipulate search results. Shortly put, “by adding two parameters to any Google Search URL, you can replace search results with a Knowledge Graph card of your…

CYBER NEWS

Three Vulnerabilities in systemd-journald Discovered (CVE-2018-16864)

Three vulnerabilities in a component of system have been discovered by researchers at Qualys. The vulnerabilities are CVE-2018-16864, CVE-2018-16865, and CVE-2018-16866, and patches addressing them are already available. More specifically, they were were discovered in systemd-journald, which is a part…

CYBER NEWS

Unable to Uninstall Facebook on Samsung Phones? You’re Not Alone!

Have you had issues with removing permanently the Facebook app from Samsung Galaxy smartphones? You’re not the only one! Nick Winke, a photographer in the Pacific Northwest, has shared his bad experience regarding his Galaxy S8 phone, and the story…

CYBER NEWS

Intel and Facebook Working on AI Inference Chip Called Nervana

Intel and Facebook are working together on a new artificial intelligence (AI) chip. Called the Nervana Neural Network Processor (NNP-I), it is an AI chip for inference-based workloads. The new chip is expected to be finished in the second half…

CYBER NEWS

Comcast Releases AI-Powered Service to Protect Connected Devices

Comcast had made an important announcement about a new AI-powered service that is meant to monitor, block and inform customers about online threats connected to home networks. The service is called xFinity xFi Advanced Security, and its main purpose is…

CYBER NEWS

$1.1 Million in ETC Lost After Double-Spend Attacks on Coinbase

A series of attacks have been detected on the popular crypto exchange Coinbase which led to the suspension of all transactions of Ethereum Classic. The transactions are suspended on Coinbase’s trading platforms, products and services. The incident resulted in the…

CYBER NEWS

ReiKey Tool Protects Against macOS Keyloggers

It’s no news that macOS users also need protection against malicious code. The good news is that macOS users now have a new tool designed to help them identify generic keyloggers that may be plaguing their systems. The tool is…

CYBER NEWS

Meet GHIDRA, NSA’s Free Malware Disassembler Tool

GHIDRA is the name of a free reverse engineering tool that will be released by the NSA during the upcoming RSA security conference in March in San Francisco. The software is a disassembler that is designed to break down executable…

CYBER NEWS

Google Refused to Patch a Vulnerability in Android Chrome for 3 Years

Google has just fixed a three-year old vulnerability in Chrome for Android. The vulnerability was originally discovered in May 2015, but it took a while for Google to evaluate the threat and its potential. In 2015, Nightwatch Cybersecurity researchers discovered…

CYBER NEWS

EU Funds Bug Bounty Programs for 14 Open Source Projects

The European Union is about to sponsor 14 bug bounty programs for vulnerabilities in 14 popular open-source software projects. The announcement was made a few days ago by Julia Reda, who represents the German Pirate Party in the European Parliament.…

CYBER NEWS

The 5G Technology Raises Cyber-Espionage Concerns

5G networks are rapidly expanding across the globe, with many countries launching commercial 5G services and deploying infrastructure. Apparently, Qatar’s Ooredoo has already launched a commercial service, and South Korea and China are planning to launch 5G next year. 5G…

CYBER NEWS

Clickjacking Vulnerability Can Be Exploited to Create Facebook Worm

2018 hasn’t been easy on Facebook. The social platform has been through some dramatic data and security breaches that affected millions of its users. Facebook also experienced several drops on the stock market. It is interesting to note that Facebook’s…

CYBER NEWS

Google and Yahoo Targeted in Tricky Phishing Campaign That Bypasses 2FA

Google and Yahoo have been targeted in new phishing attacks that are able to bypass two-factor authentication (2FA). Secure email services are also victims of these attacks as they can be successfully compromised, researchers said in a report published by…

CYBER NEWS

CVE-2018-8653 in Internet Explorer: Microsoft Patches Yet Another Zero-Day

Microsoft has just released a security update for Internet Explorer after receiving a report from Google about a new vulnerability being used in targeted attacks. The vulnerability, which was given the CVE-2018-8653 identifier, could allow for arbitrary code execution. Affected…

CYBER NEWS

NASA Data Breach Potentially Exposes Personal Information of Employees

NASA has been through a data breach which most likely affected the personal details of both current and former employees. At least one of NASA’s servers has been hacked. According to the agency, unknown hackers successfully gained access in late…

CYBER NEWS

Windows Sandbox Feature Will Be a Fact in Early 2019

Microsoft just announced that Windows 10 19H1 will be equipped with a sandbox feature starting early in 2019. Windows Sandbox is an isolated, temporary, desktop environment where users can run untrusted software without the fear of negative effects on their…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree