Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 162

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS
windows95-printer-vulnerability-stforum

Printer Vulnerability Since Windows 95 Put Entire Enterprises at Risk

Printer Vulnerability – How Using a Printer Can Attract Threats Every home office or business uses printers in their daily work – if we are printing out an essay at home, or we are printing out a contract in the…

CYBER NEWS
hands-woman-laptop-notebook-large

3 Offbeat Techniques to Secure Your Laptop

Today, most businesses run on laptops. Business users are often targeted by malware. One question that every business owner has to answer is how secure the laptops within their organization really are. According to CSO Online, every business should take…

CYBER NEWS
stop-ransomware-sensorstechforum

The Best Way to Beat Ransomware? Greylisting and Removal of Admin Rights

The simultaneous greylisting of applications and removal of local admin rights works as the best protection against ransomware. This is the result of a study executed by CyberArk Labs, published in August 2016. The company tested more than 23 000…

CYBER NEWS
user-tracking-fingerprinting-stforum

Battery Status API Employed for Online Tracking Reasons

Tracking is one of the serious privacy issues users are facing on a daily basis. If a party wants to get your personal information, it may get quite creative in the ways to obtain it. One of the most recent…

CYBER NEWS
android-notifications-google-stforum

Android Users Will Now Receive Native Security Notifications from Google

One of the latest security-inspired actions Google has put into motion is moving its security prompts to smartphone notifications. Until now the security notifications were sent via email and SMS. Additionally, Google plans to increase the amounts paid to bug…

CYBER NEWS
800px-Fast_attack_submarine_USS_Annapolis_(SSN_760)

Underwater Hacking: US Submarines Used for Cyber-Offensive Missions

Image Source: Wikipedia We all have heard rumors or read news about the magnitude of state-sponsored hacking and industrial cyber espionage. The level of invisible cyber invasion of which governments are capable of, however, may be a lot more advanced…

CYBER NEWS
previously-on-mr-robot-stforum

Mr. Robot Season 2 Hacks and Exploits: Darlene, the Massacre and the Trojan

SPOILERS ALERT! Have you been impatiently looking forward to Mr. Robot’s second season? Do you always have questions about the hacks that take place during the show? Are you often pausing to have a closer look at what’s written on…

CYBER NEWS
android-malware-stforum

HTML Source Code Viewer Android App Steals Media from Developers

Unfortunately, Google Play is full of booby traps and users should always be careful with the apps they install. Recent examples of applications that turned out to be more than what the user has bargained for are: Flash Keyboard Candy…

CYBER NEWS
how-fast-can-malware-spread-across-town-stforum-

Here’s How 2016 Ransomware Is Getting More Sophisticated

It’s common knowledge that ransomware has become the most feared and destructive online threat, putting the biggest of corporations on their knees. Security researchers expect it to continue evolving, in 2016 and perhaps beyond. To understand where ransomware and generally…

THREAT REMOVAL
chimera-latest-variant-scareware-tactics-2015-germay

Petya RaaS Operator Leaks Decryption Keys for Rival Chimera Ransomware

We may not think of cyber crime as a “business sector” that also generates rivalry, but it doesn’t mean that cyber crime groups do not compete with each other. Having said that, it shouldn’t be too surprising that the author…

CYBER NEWS
antiransomware-protection-stforum

Ransomware Cyber Guarantee Offers to Pay Up to $1 Million

In late 2015, security firm SentinelOne added a brand new feature to their endpoint detection products designed specifically to restore files encrypted by ransomware. When we wrote about the company’s plans to release this solution, the component was supposed to…

CYBER NEWS
mr-robot-elliot-tyrell-stforum

Mr. Robot Season 2 Hacks and Exploits: The Hot Wallet and the Phreaker

Have you been impatiently looking forward to Mr. Robot’s second season? Do you always have questions about the hacks that take place during the show? Are you often pausing to have a closer look at what’s written on that PC…

CYBER NEWS
mac-malware-osx-stforum

5 Device Hijacking OS X CVEs Stem from Processing Image Formats

Cisco Talos security researchers have unveiled security vulnerabilities (CVEs) which could compromise Mac OS X devices. The flaws enable attackers to harvest the user’s data and can lead to remote code execution and device hijacking. The total number of the…

CYBER NEWS
spam-campaigns-sensorstechforum

Rio 2016 Olympics-Themed Scams and Malware are on the Rise

Nowadays, any international event has the potential to become exploited by hackers. The 2016 Summer Olympics, or simply referred to as Rio 2016, are definitely going to attract malicious attention, and security researchers are already making prognosis as to what…

CYBER NEWS
It’s 2016! Let’s Look Beyond Antivirus for Protection Against Advanced Malware

Kaspersky, AVG, Symantec, Microsoft Affected by Code Hooking Bug

Security researchers at enSilo have come to some shocking conclusions in terms of the hooking and injection methods employed by various vendors. Their research started in 2015 when they noticed an injection issue in AVG. Later, they found similar problems…

CYBER NEWS
phishing-credit-card-stforum

Crooks Find a New Way to Steal Credit Card Data from Online Shoppers

How safe are my credit card data and credentials? Because cyber crooks are continually working towards improving their methods, this is a question that deserves addressing on a daily basis. New Scam Combines Phishing and Infection of Legitimate Pages to…

CYBER NEWS
document- malware -2016-sensorstechforum

CVE-2015-1641 and CVE-2015-2545 Prevail in Microsoft Office Malware

Microsoft Office vulnerabilities are cyber criminals’ favorites. Two of the more recent flaws – CVE-2015-1641 and CVE-2015-2545 – are quickly stepping up the malware game and seem to be replacing the all-time-favorite CVE-2012-0158. The latter leveraged a weak spot in…

CYBER NEWS
poodlecorp-twitter-pokemon-go-stforum

PoodleCorp to Blaim for DDoS Attack on Pokemon GO Servers?

Ever since the privacy scandal, Pokemon GO has been a hot discussion topic. However, a new issue is now added to the pile of problems that Pokemon GO creators need to face – a DDoS attack carried out by PoodleCorp.…

CYBER NEWS
mr-robot-season-2-stforum

Mr. Robot Season 2 Hacks and Exploits: Preparing fsociety Cryptowall…

Spoilers alert! Have you been impatiently looking forward to Mr. Robot’s second season? Do you always have questions about the hacks that take place during the show? Are you often pausing to have a closer look at what’s written on…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree