Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 156

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS
malware-header-stforum

The Resurrection of Shamoon Wiper Malware

The upcoming winter holidays bright forth not only new cyber threats but also old malware pieces. That’s exactly the case with Shamoon malware which has apparently returned to the malware scene after a four year vacation. Reports from security companies…

CYBER NEWS
iphone-apple

How to Bypass Apple’s iOS Activation Lock on iPhone and iPad

The myth that Apple devices are invincible to hacking is slowly starting to fade away to reality. And the reality is that Apple, just like every other tech giant, can’t keep up with the “dark side” of technology. It’s now…

CYBER NEWS
info_2_revised-11-23-16-copy

Gooligan Android Malware Endangers One Million Google Accounts

A new very dangerous malicious campaign was just discovered by researchers at Check Point. The attack campaign is dubbed Gooligan and succeeded to breach the security of more than one million Google accounts. Researchers say that this huge number continues…

CYBER NEWS
watch-dogs-ubisoft

Predictive World by Ubisoft Uses Big Facebook Data to Tell You Who You Are

Big Data is changing our lives every day, no matter if we realize it or not. There are certain projects, however, that perfectly depict what Big Data is capable of. A quite peculiar project was just launched, curiously dubbed Predictive…

CYBER NEWS
help-sensorstechforum

KB3200970 Has Caused Issues on Lenovo Devices, Microsoft Admits

Were you one of the users having troubles with the cumulative update KB3200970? The update is part of this month’s Patch Tuesday, and Lenovo users, particularly, were experiencing issues with it. Microsoft has finally explained why. In a November 24…

THREAT REMOVAL
language-spam-secret-%c9%a2oogle-com-you-are-invited-enter-only-with-this-ticket-url-copy-it-vote-for-trump

Block Language Spam (secret.ɢoogle.com) in Google Analytics

A new wave of new Google Analytics spam has been registered. It appears that spammers are continuously reinventing their methods, as seen in this new instance which displays some relatively new spam behavior. This spam has been dubbed “language spam”.…

CYBER NEWS
trojan

Dridex Spread via Compromised OneDrive for Business Accounts

Forcepoint researchers have disclosed a new current of attacks that involve Microsoft’s OneDrive for Business. Cybercriminals are hosting malware on the service to attack links in emails that are then sent to users. The researchers say that: (…) cybercriminals have…

CYBER NEWS
tesla-car-android-app-stealing-tesla

How to Steal a Tesla Car, the Android App Edition

An Android app is enough to locate, unlock, and steal a Tesla car. This is what researchers at Promon succeeded to prove just by using a single application. Our researchers have demonstrated that because of lack of security in the…

CYBER NEWS
windows-xp

Old Computers Make Users Drink and Shout, Microsoft Survey Says

Microsoft has carried out a survey in the UK to outline the reasons which frustrate Windows users the most. Not surprisingly, the age of computers turned out to be the number one frustration and cause of issues. The survey also…

CYBER NEWS
technology-music-sound-things

Speak(a)r Proof-of-Concept Malware Turns Headphones into Spies

All our devices could turn into a gateway for spying, even our headphones. Israeli security researchers at Ben Gurion University recently discovered a way to turn headphones into microphones to use them to record audio. In other words, your headphones…

CYBER NEWS

SQL Injection Enough to Hack a Government Website

SQL injection is enough to hack the Hungarian Human Rights Foundation. This is exactly what security pentester Kapustkiy did, together with CyberZeist. The two got access to more than 20,000 accounts and personal information such as phone numbers and home…

CYBER NEWS
android-malware-sensorstechforum2

New Android Malware Targets 15 German Banks

Christmas is coming! Unfortunately, in the realms of malware and cyber fraud, the coming of winter holidays bears a tinge of bitterness. It’s that time of the year when cybercriminal activity hits the ceiling. That being said, it should come…

CYBER NEWS
android-malware-stforum

Android Firmware Acts Like Backdoor, Secretly Transmits PII to a Chinese Company

Mobile application security company Kryptowire has just disclosed a pre-installed backdoor on more than 700 Android devices. The backdoor transmits data to a server in China every 72 hours. The firmware could target specific users and text messages matching remotely…

CYBER NEWS
geekedin-front-page

8 Million GitHub Profiles Exposed Due to Vulnerability in Another Service

Troy Hunt has released information about yet another data leak affecting more than 8 million GitHub profiles. The security researcher, however, made sure to highlight that the leak isn’t a result of a vulnerability found on GitHub: (…)This incident is…

CYBER NEWS
the_eye_of_sauron_by_stirzocular-d86f0oo

Is UK’s Snoopers’ Charter Becoming an All-Seeing Eye?

Is the UK government becoming the all-seeing eye? Image Source: Stirzocular/Deviantart Internet privacy definitely has a butterfly effect feeling to it. Or maybe the term ‘privacy’ is totally misused, as in most cases people are dealing with the lack of…

CYBER NEWS
poisontap

$5 PoisonTap Hack Tool Hijacks All Web Traffic, Installs a Backdoor

The exploit tool arsenal just got bigger. Meet PoisonTap, a tool created by the infamous Samy Kamkar. PoisonTap is designed to run freely available software on a $5 Raspeberry Pi Zero device. But how does it work? The tiny tool…

CYBER NEWS
eye

Australia’s Facial Verification System Will Fight Identity Crime

Australia’s facial verification system (FVS) which was announced in 2015 is already up and running. The first three agencies to have access are the Department of Foreign Affairs and Trade (DFAT), the Australian Federal Police (AFP), and the Department of…

CYBER NEWS
pexels-photo

Human Factors Lead to Network Outages, and This Survey Proves It

The human operating system is culpable for a prevalent amount of network outages, a new global study finds. Conducted by Dimensional Research, the study (called “Network Complexity, Change, and Human Factors Are Failing the Business”) surveyed 315 network professionals regarding…

CYBER NEWS
risk-security-stforum

Recruitment Firm Michael Page Joins the Data Breach Family

Another major data breach has been disclosed by Troy Hunt. In his words, the breach at global recruitment firm Michael Page has a lot in common with the Australian Red Cross incident. More particularly: It was the same individual who…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree