Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 143

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS

Chrome Bug Allows Websites to Record Audio and Video

AOL web developer Ran Bar-Zik has uncovered a Google Chrome bug that allows websites to record audio and video without the user’s knowledge or any signs of the activity. Google however doesn’t consider the bug to be a critical security…

CYBER NEWS

Does Amazon Underground App Store Jeopardize Android Security?

The Android operating system has a restriction to block the installation of applications outside Play Store. Switching to “unknown sources” is a very bad idea regarding the security of the device, and any many security experts would confirm this. Interestingly,…

CYBER NEWS

Old but Still Rolled: NTFS Bug Crashes Windows 7, 8.1

A new Windows flaw, affecting almost all versions of the OS, Windows 10 excluded has been unearthed. More specifically, Windows 7 and Windows 8.1 are prone to the same bug where certain bad filenames make the system lock up or…

CYBER NEWS

CVE-2017-7494, the RCE Bug in Samba’s SMB Implementation

Have you heard of the Samba project? It’s a popular open source project that is used on Linux and Unix machines so that they work with Windows file and print services. The project lets you work as a client that…

CYBER NEWS

Cloak and Dagger Exploits Affect All Versions of Android

Researchers from Georgia Institute of Technology and UC Santa Barbara have uncovered a new Android exploit affecting all versions of the operating system. The exploit is dubbed Cloak and Dagger and is seen as a new class of potential attacks…

CYBER NEWS

Avast Develops BTCWare Ransomware Decrypter

Victims of the BTCWare ransomware now have a way to decrypt their files for free using the decryption tool developed by Avast. Related Story: Find Decryption Key for Files Encrypted by Ransomware Avast Develops BTCWare Decrypter BTCWare is a ransomware…

CYBER NEWS

CISO Demand Drives CISO Salaries up to €1 Million

Ever dreamed of a career in the field of cybersecurity? These positions become more and more valuable and well-paid. Chief Information Security Officers in particular are in high demand right now and, considering the complexity and stress levels of the…

CYBER NEWS

Athena Surveillance Tool Designed to Spy on Windows XP – Windows 10

Meet Athena, the latest file unearthed in WikiLeak’s Vault 7 inventory of CIA hacking tools. Athena is a surveillance (spying) tool which has been created to capture communications from computers running Windows XP to machines on Windows 10, researchers say.…

CYBER NEWS

NSA Cyber Weapons Defense Tool Scans for Vulnerabilities

The WannaCry ransomware outbreak took place because of the EternalBlue vulnerability obtained by the NSA and then stolen from the Shadow Brokers. The hacking group recently revealed more vulnerabilities owned by the NSA claiming the agency used them to get…

CYBER NEWS

WannaCry Infections on Windows 7 Account for 98% of All Attacks

Kaspersky Lab statistics indicate that WannaCry attacks on Windows 7 accounted for 98% of the total number of infections. More particularly, over 60% of the systems attacked by WannaCry were running the 64-bit version of Windows 7, whereas 32% of…

CYBER NEWS

Phishing Sites Go HTTPS In Response to Chrome, Firefox New Feature

Netcraft researchers report that the number of phishing sites using HTTPS has increased since January when a new feature was introduced in Mozilla Firefox and Google Chrome browsers. Thanks to this feature, the two browsers display warnings when an HTTP…

CYBER NEWS

CVE-2017-8917 – Easily Exploitable Joomla SQL Flaw

CVE-2017-8917 is a Joomla vulnerability just disclosed by Sucuri researchers. During regular search audits, the researchers discovered an SQL injection flaw affecting Joomla! 3.7. The flaw is easily exploitable as it doesn’t require a privileged account on the target’s site.…

CYBER NEWS

Adylkuzz Uses WannaCry Exploits, Mines Monero Cryptocurrency

Security researchers at Proofpoint just revealed that there’s been another attack that used the same exploits deployed in the WannaCry global ransomware outbreak. More particularly, Proofpoint’s Kafeine researcher says that the EternalBlue exploit has been used together with a backdoor…

CYBER NEWS

WordPress Bug Bounty Program Interested in XSS, RCE, SQL Flaws

WordPress is one of the platforms that often fall victims to malicious attacks. Fortunately, the company has decided to join the bug bounty initiative, now embraced by multiple organizations in their attempt to confront cybercrime. Security researchers who come across…

CYBER NEWS

Irfan Shakeel: Unnecessary Network Connectivity Makes Critical Data Vulnerable

Irfan Shakeel is an engineer, penetration tester, a security researcher who has dedicated his career to securing information through quality education. Irfan is the founder of ehacking.net and the EH Academy where people interested in programming, penetration testing, wireless and…

CYBER NEWS

Top 5 WannaCry Ransomware Mitigations to Adopt Now

The WannaCry (.WNCRY, Wana Decrypt0r 2.0) ransomware outbreak is definitely the scariest cybersecurity event of 2017. So far. The ransomware has compromised the systems of Telefonica in Spain, as well as multiple hospitals in the UK. It has also been…

CYBER NEWS

Researchers Find Built-In Keylogger in HP Audio Driver

Are you the owner of an HP laptop? Then read carefully. Security researchers from security firm Modzero came across a built-in keylogger in an HP audio driver while examining Windows Active Domain infrastructure. “Security reviews of modern Windows Active Domain…

CYBER NEWS

CVE-2017-5891, CVE-2017-5892 Found in Asus RT Wireless Routers

ASUS RT wireless router owners, beware! If you haven’t updated your router’s firmware, you should do it immediately. Nightwatch Cybersecurity researchers have found vulnerabilities, CVE-2017-5891 and CVE-2017-5892, in these routers. The team has revealed the POC exploit code for the…

CYBER NEWS

Persirai IoT Malware Exploits CVE-2017-8224, Known Vulnerabilities

A researcher has found multiple vulnerabilities in Wireless IP Camera (P2P) WIFICAM cameras and also flaws in custom HTTP server. More specifically, more than 100,000 Internet-connected cameras are prone to attacks by a new IoT malware dubbed Persirai. The malware…

CYBER NEWS

KB4016871 May Cause Issues, DISM Still Not Working

Cumulative updates often cause headaches. Microsoft just rolled out May 2017’s Patch Tuesday, so let’s see how smooth things are going. The majority of users say that they experienced zero issues installing the cumulative updates. But there are still people…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree