Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 154

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS

Firefox Container Add-On Cuts Off Facebook Tracking

Facebook Container is the name of a brand new add-on for Firefox that the Mozilla Foundation released to isolate Facebook and all of its domains from tracking users across the websites they visit while browsing. The add-on is built on…

CYBER NEWS

CVE-2017-5754 Microsoft Patch for Meltdown Turns Out Buggy

Instead of fixing things, the patch Microsoft released for the Meltdown bug as part of the January 2018 Patch Tuesday – CVE-2017-5754 – caused further issues on Windows 7. The faulty patch allows user-level apps to read content from the…

CYBER NEWS

AVCrypt (av2018.exe) – Ransomware or Wiper Malware?

AVCrypt is the name (after a sample named av2018.exe) of a new ransomware that displays a rather unique behavior. The ransomware attempts to uninstall whatever anti-virus and security programs are present on the targeted system. Not only does AVCrypt attempt…

CYBER NEWS

macOS Bug Exposes Passwords in Plain Text by Using a Terminal Command

Another vulnerability in macOS has been unearthed exposing passwords used for encrypted APFS external drives in plain text. The bug is present in macOS 10.13.1, and according to mac4n6, the researcher who found it, it’s still there in macOS 10.13.3.…

CYBER NEWS

Facebook Logins Sold for $5.20 Each on the Dark Web

A new report compiled by marketing agency Fractl reveals how much worth is a user’s login for a range of online services used on a daily basis, such as Facebook, PayPal, DHL, and Gmail. The results are staggering. To do…

CYBER NEWS

Be Worried: Facebook Scraped SMS and Calls Data on Android Devices

Facebook is once again at the center of attention, following the events from last week when the Cambridge Analytica scandal burst out. Now, it has come to the attention of several users that the Facebook’s mobile apps for Android have…

CYBER NEWS

TeleRAT Android Trojan Uses Telegram Bot API for C&C Communication

TeleRAT is the name of the latest Android Trojan that was discovered by researchers at Palo Alto Networks. The Trojan is designed to use Telegram Bot API for communication with its command and control server with the purpose of exfiltrating…

CYBER NEWS

Monero Miner Hits Linux Servers Using the Old CVE-2013-2618

Trend Micro researchers have observed a new Monero cryptocurrency mining campaign that targets Linux servers. The campaign is using reused and known vulnerabilities – more particularly, a flaw that has been patched for five years. Users should note that the…

CYBER NEWS

Ledger Hardware Wallet Vulnerability Exposed by Teen Hacker

Ledger cryptocurrency hardware wallets have been found to be vulnerable, a teenage security researcher revealed in a blog post. The 15-year-old Saleem Rashid discovered the bug that allowed attackers to fabricate the device’s seed generation, and this way harvest any…

CYBER NEWS

CVE-2018-0878 in Windows Remote Assistance Discovered

CVE-2018-0878 is the identifier of an information disclosure vulnerability that exists in Windows Remote Assistance. The flaw is triggered when WRA incorrectly processes XML External Entities (XXE). An attacker who successfully exploits the flaw could obtain information further abuse the…

CYBER NEWS

50 Million Facebook Profiles Exploited for Trump’s Election Campaign

Probably the most important factor when it comes to Facebook criticism is the way the social network handles the personal data of its users. Privacy issues related to individual cases have fueled the debate over time. The majority of the…

CYBER NEWS

BlackTDS: Traffic Distribution Network as a Malicious Service

There were times, not too long ago, when exploit kits were widely deployed by hackers in various types of malicious campaigns. However, with the improvement of browsers and some other security-focused factors, the use of EKs began to decline, and…

CYBER NEWS

Prilex PoS Malware Has Everything Cybercrooks Need

Do you remember the Prilex PoS (point-of-sale) malware? Prilex is one of the latest strains of ATM malware pieces that has been used in highly targeted attacks on Brazilian banks. The malware has been developed using the Visual Basic 6.0…

CYBER NEWS

Bitcoin Real Estate, Gaming Currency Used by Crooks to Launder Money

According to a recent research by University of Surrey, cryptocurrencies have become the dominant tool for money laundering. How was the study conducted? Researchers gathered information directly from convicted cybercriminals and law-enforcement agencies. Apparently, crooks are using cryptocurrency to buy…

CYBER NEWS

Which Is the Most Popular Ransomware Family for 2017?

According to Microsoft’s Security Intelligence Report, Asia was the region with the highest number of ransomware infection in the period between February and December, 2017. The statistics are taken from the report’s special section dedicated to ransomware. Myanmar and Bangladesh…

CYBER NEWS

RottenSys Android Malware Pre-Installed on 5 Million Devices

Android is once again found to be vulnerable to a serious piece of malware, and this time the scale of the infection is larger than one could imagine. Security researchers came across a massive, unceasing campaign that has infected about…

CYBER NEWS

MailChimp Abused to Deliver GootKit Banking Malware for 4 Months

Apparently, MailChimp email service has been frequently abused to deliver spam messages carrying malware infections. Security researchers have been frustrated because this problem has been happening for quite some time. MailChimp Abused in Spam Campaigns Distributing Malware The issue needs…

CYBER NEWS

Three Popular VPNs Found to Be Leaking Real IP Addresses

Are you privacy-savvy and relying on a VPN to keep your online business to yourself? If so, you may want to know that a VPN recommendation site decided to test 3 VPNs to see whether they were flawlessly performing their…

CYBER NEWS

Bitcoin-Stealing Trojanized Apps Found on Download.com

Bitcoin is once again making the headlines, this time thanks to a piece of malware found on Download.com. The malware was stealing malware identified as through swapping user accounts with the accounts of the hackers behind the operation. This operation…

CYBER NEWS

CVE-2018-1050, CVE-2018-1057 Samba Flaws Endanger Servers

Two critical vulnerabilities (CVE-2018-1050, CVE-2018-1057) have been discovered in Samba, the open-source software that is a re-implementation of the SMB networking protocol. The Samba software can run on popular operating systems such as Windows, Linux, UNIX, IBM System 390, OpenVMS.…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree