Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 163

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS

Researchers Find Built-In Keylogger in HP Audio Driver

Are you the owner of an HP laptop? Then read carefully. Security researchers from security firm Modzero came across a built-in keylogger in an HP audio driver while examining Windows Active Domain infrastructure. “Security reviews of modern Windows Active Domain…

CYBER NEWS

CVE-2017-5891, CVE-2017-5892 Found in Asus RT Wireless Routers

ASUS RT wireless router owners, beware! If you haven’t updated your router’s firmware, you should do it immediately. Nightwatch Cybersecurity researchers have found vulnerabilities, CVE-2017-5891 and CVE-2017-5892, in these routers. The team has revealed the POC exploit code for the…

CYBER NEWS

Persirai IoT Malware Exploits CVE-2017-8224, Known Vulnerabilities

A researcher has found multiple vulnerabilities in Wireless IP Camera (P2P) WIFICAM cameras and also flaws in custom HTTP server. More specifically, more than 100,000 Internet-connected cameras are prone to attacks by a new IoT malware dubbed Persirai. The malware…

CYBER NEWS

KB4016871 May Cause Issues, DISM Still Not Working

Cumulative updates often cause headaches. Microsoft just rolled out May 2017’s Patch Tuesday, so let’s see how smooth things are going. The majority of users say that they experienced zero issues installing the cumulative updates. But there are still people…

CYBER NEWS

Severe CVE-2017-0290 in MsMpEng About to Be Patched

Just this morning, we wrote about the “worst Windows remote code exec in recent memory” discovered by Google Project Zero researchers Tavis Ormandy and Natalie Silvanovich. The terrifying bug is now made public and has been identified as CVE-2017-0290. The…

CYBER NEWS

Worst Windows Remote Code Execution Bug in Recent Memory Found

Researchers Tavis Ormandy and Natalie Silvanovish from Google Project Zero have discovered and reported a remote code execution vulnerability in Windows. This bug is in fact the “worst Windows remote code exec in recent memory”. The researchers also described the…

CYBER NEWS

Money Stolen via BEC Scams Funneled to Banks in China and Hong Kong

The Continuous Growth of BEC Scams Demonstrated in the Latest FBI Report BEC (Business Email Compromise) scams have grown to the staggering rate of 2,370 percent in the last couple of years, as reported by the FBI. The latest FBI…

CYBER NEWS

Hackers Exploit SS7 and mTANs to Drain Bank Accounts

Signaling System No. 7 known as SS7 has been exploited by hackers in attacks designed to steal money from victims’ online bank accounts. SS7 is a set of telephony signaling protocols developed in 1975, which is used to set up…

CYBER NEWS

Android Users, How Much Do You Know about Ultrasonic Tracking?

Have you heard of ultrasonic tracking? You may not be aware of it but it doesn’t mean you aren’t subjected to it. As discovered by researchers at Technische Universit at Braunschweig Brunswick, Germany, more and more Android applications are listening…

CYBER NEWS

DDoS Attacks Cost Organizations $250,000 per Hour

A new report by Neustar shows that DDoS attacks are quite expensive and cost organizations more than $2.5 million in revenue. Barret Lyon, Head of Research and Development at Neustar, called these attacks “the zeitgeist of today’s Internet”, and highlighted…

CYBER NEWS

The Brands Mostly Affected by Phishing and Domain Spoofing

A new report by DomainTools reveals the names of the retail companies that are the most frequent victims of phishing. These brands are abused by scammers who create look-alike domains to harvest users’ details. According to the researchers, brands like…

CYBER NEWS

Malware Hunter Locates the Command and Control Centers of Botnets

Malware Hunter is the name of a brand new tool created by threat intelligence company Recorded Future and Shodan, the search engine for IoT devices. The tool is in fact an online crawler designed to block communications between malware and…

CYBER NEWS

Reconyc Trojan Found on USB Drives Shipped with IBM Storewize

IBM is alerting customers to get rid of USB drives shipped with some of its Storewize storage systems as the devices may contain malware identified as part of the Reconyc Trojan (Trojan.Reconyc) family. It is best if the USB drives…

CYBER NEWS

OSX.Dok Mac Malware Could Impersonate Any Website

Researchers have unearthed a new sample of Mac Malware which is more sophisticated and insidious than previously discovered pieces. The malware has been dubbed OSX.Dok or Dok Malware, and has been used in attacks on European users, targeted via convincing…

CYBER NEWS

INTEL-SA-00075: Intel Platforms from Nehalem to Kaby Lake Remotely Exploitable

Intel’s Active Management Technology (AMT), Standard Manageability (ISM), and Small Business Technology (SBT) firmware has been found to be vulnerable to escalation of privilege flaws that could lead to remote control. Intel has identified the flaws as INTEL-SA-00075. Related: The…

CYBER NEWS

8,400 New Malware Samples Daily for Android Users

Are you an Android device user? If so, you should be extremely cautious not to become a victim of malware hiding in app stores. Security researchers at G Data say that 750,000 new Android malware apps have been discovered only…

CYBER NEWS

Verizon’s Data Breach Investigations Are Your Biggest Security Nightmare

Another report today is indicating the steady growth of ransomware attacks, as well as the increasing danger of cyberespionage. According to Verizon, organizations in manufacturing, the public sector and education are frequent targets of cyberespionage. At least 90% of 289…

CYBER NEWS

In 2017, Most Users Remain Completely Unaware of Ransomware

One of the most important questions to ask when dealing with ransomware cases is whether victims pay the demanded ransom. Apparently, about 40% of these victims pay the ransom to get their files decrypted, a new report by Trustlook says.…

CYBER NEWS

Linux/Shishiga Malware Brute-Forces SSH Credentials

A new strain of Linux malware has been detected. Dubbed Linux/Shishiga, the malware could transform into a dangerous piece of malware. Linux/Shishiga was officially discovered and examined by researchers at Eset. “Among all the Linux samples that we receive every…

CYBER NEWS

KB4016240 May Cause Installation Issues for Some Users

Windows 10 cumulative update KB4016240 for systems running the Creators Update is already a fact, and there are some users having problems with it. First of all, what is the update all about? It is a non-security update that “includes…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree