Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 166

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS
linkedin-167-million-accounts-data-breach-stforum

LinkedIn Data Breach: 117 Million Accounts Up For Sale

If you’re a professional in any business area, there’s a big chance you have a LinkedIn account. So read carefully – LinkedIn has suffered a major data breach. The latter has apparently led to probable sale of sensitive information harvested…

CYBER NEWS
cisco-logo-CVE-2016-1379-CVE-2016-1385

Cisco Patches ASA Software against CVE-2016-1385, CVE-2016-1379

If you’re a user of Cisco’s Adaptive Security Appliances (ASAs), you should probably have a look at their latest patches. The patches are addressing two separate issues, CVE-2016-1385, a flaw in the ASA XML parser, and CVE-2016-1379, a VPN block…

CYBER NEWS
p12_0000

Pornhub in a Server Breach Hoax, Hacker’s Claims Rated Bogus

Shortly after Pornhub announced their Bug Bounty program, a gray hat hacker known as Revolver released claims that the website’s web server was compromised. Were his claims true or just a cry for attention? Let’s see. Read More about PH’s…

CYBER NEWS
google-certificate-Redirector.Paco

Redirector.Paco Clickbot Steals Millions of AdSense Revenue

Bitdefender security researchers have discovered a clickbot, dubbed Redirector.Paco which has continuously abused companies’ Google advertising revenues. Cristina Vatamanu, Răzvan Benchea, and Alexandru Maximciuc have discovered that the botnet’s start of activity dates back to September 2014. Since then, over…

CYBER NEWS
symantec-exploit-tavis-ormandy

Symantec/Norton CVE-2016-2208 Flaw Causes Remote Memory Corruption

Software products are not perfect and can be full of vulnerabilities, anti-virus software included. Bug hunters and white hats are usually the ones to disclose flaws in applications, and to notify the vendors so that a fix is implemented. If…

CYBER NEWS
google-chrome

Google Chrome’s HTML5 by Default Pushes Flash Player Aside

Vulnerabilities in Adobe’s Flash Player may seem trivial but yet they are among the flaws mostly leveraged by attackers. Perhaps that’s a reason good enough for Google to decide to make HTML5 the primary standard in Chrome. Only 10 white-listed…

CYBER NEWS
shutterstock_271501652

WhatsApp’s End-to-End Encryption Prone to SS7 Vulnerabilities

WhatsApp’s recent adoption of end-to-end encryption was a big deal in the cyber security community. However, a research conducted by Positive Technologies reveals that the end-to-end encryption in services such as WhatsApp and Telegram is vulnerable. More specific, researchers have…

REVIEWS
hacker-sensorstechforum

5 Computer Security Issues That Should Concern You

Being cyber-educated is more important than ever. Let’s put it this way. The less you know about the dangers of cyber space, the more susceptible you become to malicious attacks. And vice versa, the more acquainted you are with attackers’…

CYBER NEWS
pexels-photo

Windows Zero-Day Exploited to Steal Credit Card Data from US Companies

CVE-2016-0167, a zero-day exploit addressed in April’s Patch Tuesday, has apparently been leveraged by attackers, FireEye research reveals. Cyber criminals have exploited the vulnerability in targeted attacks on more than 100 US companies. FireEye’s blog post on the matter discloses…

CYBER NEWS
night-television-tv-theme-machines

Pornhub’s Bug Bounty Program Protects P0rn Fans from Malvertisers

Many big companies and vendors have bug bounty programs which encourage independent researchers in locating and disclosing vulnerabilities. Pornhub has just joined the bug bounty initiative, as it just launched a program on HackerOne’s platform, which aims to protect and…

CYBER NEWS
CVE-sensorstechforum

7-Zip and the Not-So-Hidden Dangers of CVE-2016-2335 Flaws

You’re most likely familiar with 7-Zip, the open-source file archiving application that offers optional AES-256 encryption, support for large files, and the capacity to use all kinds of compression, conversion and encryption methods. The app is also suitable for Windows…

CYBER NEWS
p17_0000

Vishing, Smishing, and Phishing Scams Are After Your Information and Money

If you’re a daily reader of IT security and tech news, you have a good idea of phishing and spear phishing attacks. Nonetheless, even if you’re perfectly acquainted with these widely deployed social engineering schemes, you should be on the…

CYBER NEWS
windows-update-restart-now

May 2016 Patch Tuesday: CVE-2016-0189, KB3155533, KB3156764

Microsoft has just released its security updates for May 2016. And they’re quite major! Two zero-days vulnerabilities have been disclosed, and they’re both crucial – one in Windows, and one in Adobe’s Flash Player. Security experts warn that the Windows…

CYBER NEWS
Viking-Horde-Image

Viking Horde Android Malware in Viking Jump and 4 Other GP Apps

Image Source: https://blog.checkpoint.com/ Viking Horde is not a character from your favorite TV show but a new malware family currently creeping around Android devices. Security researchers at CheckPoint just released a report uncovering the new malware and the dangers it…

CYBER NEWS
malicious-threat-sensorstechforum

PerezHilton.Com, Angler EK and CryptXXX in One Sentence Is Never Good

If you’re a daily visitor of PerezHilton.com, you may be in trouble. It’s been reported that the pop and celebrity news website has compromised some of its 500,000 visitors with the Angler exploit kit, and then with the devastating CryptXXX…

CYBER NEWS
1ly4wkA

Google Data Breach Triggered by a Human Error

Google has been breached! Did we catch your attention? Any news concerning Google and a data breach is worth your full attention. It proves that no company is invincible, Google included. So, what exactly happened? More about Google: Google Knows…

THREAT REMOVAL
Bucbi-ransomware-original-ransom-note-palo-alto-stforum

Bucbi Ransomware Revived, Distributed via Brute-Forcing RDP Accounts

Security researchers at Palo Alto Networks disclosed that an old ransomware family – Bucbi ransomware – has been just revived after 2 years of silence. The Bucbi threat was discovered in 2014, and it hasn’t been registered active since then.…

THREAT REMOVAL
ransomware-virus

Can I Remove CryptMix Ransomware and .code File Extension?

Ransomware cases usually follow the same pattern of infection and behavior. However, a recently detected ransomware proves that ransomware authors can be creative, too. The so-called CryptMix ransomware is operated by a group of individuals calling themselves the Charity Team.…

CYBER NEWS
shutterstock_94715374

Jaku Botnet Used in DDoS and Spam Campaigns, Employs Steganography

A previously unknown botnet campaign, named Jaku or JAKU has been investigated by researchers at Forcepoint Security Labs. The botnet has affected more than 19,000 computers, including them in its zombie network. Interestingly, most of the victims appear to be…

CYBER NEWS
users-security-password-day-stforum-pexels

Password Day 2016. Here’s How to Celebrate!

Did you know that Password Day is celebrated on May 5? IT celebrations such as this one make us consider the importance of acting on our online security. So, if you haven’t changed your password(s) in a while, make sure…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree