Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 145

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS

MacRansom and MacSpy Prove that Macs Are Not Safe from Malware

MacRansom and MacSpy are two samples of new Mac malware that has been created by the same person. That person is also offering the two pieces for sale via the malware-as-a-service model on two dark web portals. Potential customers and…

CYBER NEWS

Eugene Kaspersky vs. Windows Defender: the Antivirus War of 2017

Kaspersky has filed anti-trust complaints against Microsoft with the European Commission and the German Federal Cartel Office. The anti-virus company has already done the same in the end of 2016 with Russia’s Federal Antimonopoly Service. The reason for these measures?…

THREAT REMOVAL

Remove Executioner (Cellat) Ransomware. Sifre_Coz_Talimat.html File

Executioner (Cellat) ransomware is yet another crypto virus recently discovered by security researchers at MalwareHunterTeam. The Executioner ransomware encrypts the user’s data and appends six random characters to the encrypted files. The crypto virus also changes the desktop wallpaper of…

THREAT REMOVAL

Remove CryMore Ransomware and Restore Encrypted Files

CryMore ransomware is a new crypto virus which has been created by a hacker known as TMC. The ransomware may encrypt or delete files based on a predefined list of file extensions. To remove CryMore ransomware, read this article carefully…

CYBER NEWS

Google Fixes CVE-2017-5070, Multiple Security Flaws in Chrome 59

Google just released patches for CVE-2017-5070 and 29 other flaws in Chrome in the latest stable version of the browser, Chrome 59.0.3071.86. Google paid out $23,500 to external researchers for their findings. Besides the Chrome flaws, a type confusion vulnerability…

CYBER NEWS

CVE-2016-8939, the TSM Vulnerability IBM Neglected for 2 Years

For one reason or another, companies often choose to fix serious security gaps in silence. That’s exactly what happened with IBM just recently when they released a workaround quietly, addressing a flaw in its enterprise backup software. The vulnerability, given…

CYBER NEWS
qakbot malware

QakBot 2017 Variant – Part Worm, Part Banking Trojan, Part Infostealer

Old malware doesn’t disappear, as evident by recent revivals of old cases. Just yesterday we wrote about the renewed distribution of the well-known Backdoor.Nital and Gh0st RAT. This article is dedicated to another old malware piece of the worm kind…

CYBER NEWS

The State of Enterprise Endpoint Security in 2017

Duo Security has analyzed the security state of 4.6 million endpoint devices including 3.5 million mobile phones. The devices have been taken from various industries and world regions which makes the analysis quite comprehensive and indicative. The study was based…

CYBER NEWS

The EternalBlue Exploit Deployed to Deliver Backdoor.Nitol, Gh0st RAT

The now-infamous EternalBlue exploit deployed in the WannaCry ransomware outbreak and in the distribution of the Adylkuzz miner is now being used to deliver the Nitol backdoor and Gh0st RAT. Both threats have been around for several years and are…

CYBER NEWS

Gmail Anti-Phishing Features Improved to Detect Attempts Early

Several new security features and improvements of old ones have been introduced to Gmail. The reason is to improve the protection against phishing emails which have been a real menace to users, distributing malware and ransomware of the worst kind.…

CYBER NEWS

RoughTed Malvertising Campaign Defeats Ad-Blockers

RoughTed is a large-scale malvertising campaign which saw a peak in March this year but has been active for at least over a year. Both Windows and Mac operating systems are targeted, as well as iOS and Android. The operation…

CYBER NEWS

CVE-2017-1000367, Severe Root Vulnerability in Linux Sudo

CVE-2017-1000367 is a severe root Linux vulnerability discovered by Qualys Security researchers. The flaw resides in Sudo’s “get_process_ttyname()” function for Linux and could allow a user with Sudo privileges to run commands as root or elevate privileges to root. Sudo,…

CYBER NEWS

Chrome Bug Allows Websites to Record Audio and Video

AOL web developer Ran Bar-Zik has uncovered a Google Chrome bug that allows websites to record audio and video without the user’s knowledge or any signs of the activity. Google however doesn’t consider the bug to be a critical security…

CYBER NEWS

Does Amazon Underground App Store Jeopardize Android Security?

The Android operating system has a restriction to block the installation of applications outside Play Store. Switching to “unknown sources” is a very bad idea regarding the security of the device, and any many security experts would confirm this. Interestingly,…

CYBER NEWS

Old but Still Rolled: NTFS Bug Crashes Windows 7, 8.1

A new Windows flaw, affecting almost all versions of the OS, Windows 10 excluded has been unearthed. More specifically, Windows 7 and Windows 8.1 are prone to the same bug where certain bad filenames make the system lock up or…

CYBER NEWS

CVE-2017-7494, the RCE Bug in Samba’s SMB Implementation

Have you heard of the Samba project? It’s a popular open source project that is used on Linux and Unix machines so that they work with Windows file and print services. The project lets you work as a client that…

CYBER NEWS

Cloak and Dagger Exploits Affect All Versions of Android

Researchers from Georgia Institute of Technology and UC Santa Barbara have uncovered a new Android exploit affecting all versions of the operating system. The exploit is dubbed Cloak and Dagger and is seen as a new class of potential attacks…

CYBER NEWS

Avast Develops BTCWare Ransomware Decrypter

Victims of the BTCWare ransomware now have a way to decrypt their files for free using the decryption tool developed by Avast. Related Story: Find Decryption Key for Files Encrypted by Ransomware Avast Develops BTCWare Decrypter BTCWare is a ransomware…

CYBER NEWS

CISO Demand Drives CISO Salaries up to €1 Million

Ever dreamed of a career in the field of cybersecurity? These positions become more and more valuable and well-paid. Chief Information Security Officers in particular are in high demand right now and, considering the complexity and stress levels of the…

CYBER NEWS

Athena Surveillance Tool Designed to Spy on Windows XP – Windows 10

Meet Athena, the latest file unearthed in WikiLeak’s Vault 7 inventory of CIA hacking tools. Athena is a surveillance (spying) tool which has been created to capture communications from computers running Windows XP to machines on Windows 10, researchers say.…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree