Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 141

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS

CVE-2018-15439: Cisco Small Business Switches Vulnerable

Cisco Small Business Switches are vulnerable to a remote attack where commands with admin privileges can be executed. The vulnerability is tracked under CVE-2018-15439, and it could allow an unauthenticated, remote attacker to bypass the user authentication mechanism of an…

CYBER NEWS

Magecart Hackers Insert Skimming Code Into a Third-Party JavaScript Library

Remember Magecart? In November last year, security researchers discovered that the the infamous malware, known for harvesting credit card details from checkout forms, [wplinkpreview url=”https://sensorstechforum.com/sites-magecart-malware-reinfected/”]could re-infect even after clean-up. Now, Magecart is active once again in notorious campaigns in which…

CYBER NEWS

Vulnerability in Amadeus Flight Booking System Affects 141 Airlines

A major security vulnerability that affects nearly half of all airlines worldwide was just discovered by researcher Noam Rotem. The researcher stumbled upon the flaw while booking a flight with Israeli national carrier EL AL Israel Airlines. The vulnerability allows…

CYBER NEWS

Five of the Biggest Hosting Providers Riddled with Vulnerabilities

Several security vulnerabilities were discovered in five popular web hosting services. The flaws enable threat actors to steal sensitive information or even take over customers’ accounts. The vulnerabilities were unearthed by security researcher Paulos Yibelo, who is a well-known bug…

CYBER NEWS

Ransomware Goes Phishing to Steal PayPal Credentials

Ransomware is usually after one thing only, and that’s encrypting the victim’s data and extorting payment for its decryption. However, a new piece of ransomware which is still in a development stage adds something else to its malicious activity –…

CYBER NEWS

New Hacking Methods to Look Out for in 2019

The number of individuals affected by data breaches and cyberattacks in 2018 is definitely in the billions, and organizations are not far behind, either. One data breach alone, Marriott’s, affected 500 million individuals! More specifically, Starwood subsidiary’s guest reservation network…

CYBER NEWS
Microsoft logo image

KB4480960 and KB4480970 Causing Issues on Windows 7

KB4480960 and KB4480970 are two security updates published by Microsoft in January 2019 Patch Tuesday. The updates are for Windows 7 SP1 and Windows Server 2008 R2 SP1, and as evident by multiple complaints by users, they are causing troubles.…

CYBER NEWS

CVE-2018-15453 Vulnerability Affects Cisco AsyncOS

A serious security vulnerability, identified as CVE-2018-15453, in Cisco AsyncOS. More precisely, the vulnerability is located in the Secure/Multipurpose Internet Mail Extensions (S/MIME) Decryption and Verification or S/MIME Public Key Harvesting features of Cisco AsyncOS Software for Cisco Email Security…

CYBER NEWS

How to Spoof Google Search Results Using Knowledge Graph

A flaw was just discovered in Google’s Knowledge Graph, which makes it possible to manipulate search results. Shortly put, “by adding two parameters to any Google Search URL, you can replace search results with a Knowledge Graph card of your…

CYBER NEWS

Three Vulnerabilities in systemd-journald Discovered (CVE-2018-16864)

Three vulnerabilities in a component of system have been discovered by researchers at Qualys. The vulnerabilities are CVE-2018-16864, CVE-2018-16865, and CVE-2018-16866, and patches addressing them are already available. More specifically, they were were discovered in systemd-journald, which is a part…

CYBER NEWS

Unable to Uninstall Facebook on Samsung Phones? You’re Not Alone!

Have you had issues with removing permanently the Facebook app from Samsung Galaxy smartphones? You’re not the only one! Nick Winke, a photographer in the Pacific Northwest, has shared his bad experience regarding his Galaxy S8 phone, and the story…

CYBER NEWS

Intel and Facebook Working on AI Inference Chip Called Nervana

Intel and Facebook are working together on a new artificial intelligence (AI) chip. Called the Nervana Neural Network Processor (NNP-I), it is an AI chip for inference-based workloads. The new chip is expected to be finished in the second half…

CYBER NEWS

Comcast Releases AI-Powered Service to Protect Connected Devices

Comcast had made an important announcement about a new AI-powered service that is meant to monitor, block and inform customers about online threats connected to home networks. The service is called xFinity xFi Advanced Security, and its main purpose is…

CYBER NEWS

$1.1 Million in ETC Lost After Double-Spend Attacks on Coinbase

A series of attacks have been detected on the popular crypto exchange Coinbase which led to the suspension of all transactions of Ethereum Classic. The transactions are suspended on Coinbase’s trading platforms, products and services. The incident resulted in the…

CYBER NEWS

ReiKey Tool Protects Against macOS Keyloggers

It’s no news that macOS users also need protection against malicious code. The good news is that macOS users now have a new tool designed to help them identify generic keyloggers that may be plaguing their systems. The tool is…

CYBER NEWS

Meet GHIDRA, NSA’s Free Malware Disassembler Tool

GHIDRA is the name of a free reverse engineering tool that will be released by the NSA during the upcoming RSA security conference in March in San Francisco. The software is a disassembler that is designed to break down executable…

CYBER NEWS

Google Refused to Patch a Vulnerability in Android Chrome for 3 Years

Google has just fixed a three-year old vulnerability in Chrome for Android. The vulnerability was originally discovered in May 2015, but it took a while for Google to evaluate the threat and its potential. In 2015, Nightwatch Cybersecurity researchers discovered…

CYBER NEWS

EU Funds Bug Bounty Programs for 14 Open Source Projects

The European Union is about to sponsor 14 bug bounty programs for vulnerabilities in 14 popular open-source software projects. The announcement was made a few days ago by Julia Reda, who represents the German Pirate Party in the European Parliament.…

CYBER NEWS

The 5G Technology Raises Cyber-Espionage Concerns

5G networks are rapidly expanding across the globe, with many countries launching commercial 5G services and deploying infrastructure. Apparently, Qatar’s Ooredoo has already launched a commercial service, and South Korea and China are planning to launch 5G next year. 5G…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree