Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 163

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

THREAT REMOVAL

.Bitconnect File Virus (Jigsaw Ransomware) – Remove and Restore

A new iteration of the well-known Jigsaw ransomware has been detected by security researchers, and it is known to append the .Bitconnect extension to encrypted files. As reported by researcher Michael Gillespie, the ransomware is using a new extortion method…

THREAT REMOVAL

.gif File Virus (GlobeImposter) – Remove and Restore Files

Security researchers have come across a new iteration of the infamous GlobeImposter ransomware. This latest iteration appends the .gif file extension to the encrypted files. Once the encryption process is over, the .gif ransomware (also referred to as .gif file…

CYBER NEWS

Fakeapp Android Malware Harvests Facebook Credentials

Because of its large user base, Facebook is often targeted by cybercriminals who use the platform to spread scams and deliver malware. The latest such campaign, dubbed Fakeapp, involves a new Android malware strain that is phishing for Facebook login…

CYBER NEWS

New Largest DDoS Attack at 1.3 Tbps Hits GitHub

The largest so far GGoS attack happened yesterday registered at 1.3 Tbps. The target was GitHub. The attack was based on a flaw in Memcached servers made public just a few days ago. Apparently, cybercriminals can exploit Memcached servers to…

CYBER NEWS

Some Phishing Emails Have a Nearly 100 Percent Click Rate

Phishing emails have been successfully fooling employers, tricking them into clicking on the provided links and thus initiating various malicious campaigns. To counter the success of phishing, many companies have started various employee trainings to help them recognize fraudulent attempts…

CYBER NEWS

Consumers Using Mobile Banking Apps at Greater Risk of Financial Loss

Mobile banking apps are a convenience but they also pose a risk to users. A new global research carried out by Avast shows that consumers using mobile banking apps are at a greater risk of falling victim to theft of…

CYBER NEWS

Coldroot macOS RAT and Keylogger Goes Undetected for Years

Coldroot is a remote access Trojan (RAT) that has been distributed on MacOS machines without being detected for quite some time. Researchers say that the malware is cross-platform and that it could successfully drop a keylogger on MacOS prior to…

CYBER NEWS

uTorrent Vulnerability Could Be Exploited by Any Website

One of the most popular BitTorrent apps – uTorrent – has been found to be vulnerable to easily exploited flaws that could allow hackers to perform a variety of malicious actions. More specifically, two versions of the app are vulnerable…

CYBER NEWS

Tesla’s Amazon Cloud Hacked in Cryptocurrency Mining Attack

A hack has happened at Tesla – the company’s cloud has been abused to mine cryptocurrency, as reported by RedLock researchers. The report is focused on cloud security. Related Story: How to Steal a Tesla Car, the Android App Edition…

CYBER NEWS

Microsoft Fails to Fix Edge Bug on Time – Google Makes It Public

Google has revealed details about a flaw in Microsoft Edge browser after Microsoft missed the deadline for fixing it. Google had previously notified Microsoft about the vulnerability in the browser via Project Zero, giving them the usual 90-day disclosure deadline.…

CYBER NEWS

Spam in 2017: Cryptocurrency Scams Sneaked in the Inbox

A new report by Kaspersky Lab has revealed the most common type of spam messages that were being delivered in the wild in 2017. Apparently, the share of spam in mail traffic decreased to 56.63 percent, which is 1.68 percent…

CYBER NEWS

Microsoft Vulnerabilities Overview: 685 Flaws Reported in 2017 Alone

The number of vulnerabilities in Microsoft products has been growing steadily during the last five years, a new Microsoft Vulnerabilities Report by Avecto reveals. More specifically, in 2013, 325 vulnerabilities were discovered and reported, and currently their number is 685.…

CYBER NEWS

Severe DLL Hijacking Flaw in Skype Won’t Be Patched by Microsoft

As of January, 2018, Skype has been used by approximately 300 million users, according to statistics by Statista. Even though Skype is not the most popular and widely used messenger, its user base still is quite big. So any news…

CYBER NEWS

Zero-Day Flaw in Telegram Exploited to Mine Zcash and Monero

Malicious actors are constantly coming up with new ways of exploiting the various cryptocurrencies available to users. Kaspersky Lab researchers just reported a zero-day flaw discovered in the Telegram Desktop app that could be used as an intermediary for hackers…

CYBER NEWS

Google Chrome Will Mark HTTP Pages As Not Secure

Google just announced that any web page lacking a security certificate (HTTPS) and being served over HTTP is going to be marked as unsecure by the Chrome browser. The change is expected to take place in July this year. HTTP…

CYBER NEWS

Hospitals Are the Latest Target of Cryptocurrency Miners

During the past couple of years, ransomware was preferably targeting medical institutions and hospitals. Multiple health organizations were hit and were left with no choice but to pay the demanded ransom. With the shift of malicious trends to cryptocurrency miners,…

THREAT REMOVAL

Top 5 Online Scams Currently Infecting Users Worldwide (2018 Edition)

Multiple reports have been issued regarding newly emerged online scams that are currently infecting users. These scams are relying on the names of well-known companies like Amazon and DHL to trick users into interacting with them. The scams are usually…

CYBER NEWS

7.8 Billion Records Compromised via Data Breaches in 2017 Alone

2017 was one of the worst years for cybersecurity experts, with the increasing number of hack attacks and various data breaches. More specifically, researchers were able to estimate that there were 5,207 breaches reported last year, a new report by…

THREAT REMOVAL

Wormable ADB.Miner for Android Uses Mirai Scanning Module

A new Android miner malware has been uncovered – ADB.Miner. The miner is wormable and is designed to scan a wide range of IP addresses to locate vulnerable devices. The miner was discovered by researchers at Netlab security firm. Related…

CYBER NEWS

Creative.Update Mac Miner Distributed via MacUpdate

A new cryptocurrency miner delivered through MacUpdate has been uncovered by security researchers. The malware which was discovered by SentinelOne researcher Arnaud Abbati has been dubbed OSX.CreativeUpdate. The miner can reside in the background of the system and use its…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree