Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 167

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

THREAT REMOVAL
pressgamers-stforum

Can I Remove PressGamer(.)Com Ads and Stop Surveys?

Have you encountered a website called PressGamer(.)com? If you have visited this website and interacted with it, be alert, since you may have downloaded ad-supported software onto your system. The website may seem like a gamers’ page but in fact…

THREAT REMOVAL
ransomware-virus

Yakes Ransomware – Removal and Decryption Methods

Ransomware infections continue. Not only are new versions of well-known threats appearing, but also new ransomware cases are registered on a daily basis. One of the latest ransomware threats currently targeting users is dubbed Yakes. According to researchers, Yakes ransomware…

THREAT REMOVAL
petya-ransomware-skull-art-acsii-master-boot-record-dropbox-unique

New Locky Ransomware Attacks. TROJ_LOCKY.DLDRA Downloader

Locky ransomware has already affected thousands of users. Unfortunately, the threat is not nearly done with its infections, as new, more dangerous methods of distribution were just reported by security researchers at TrendMicro. The new techniques include the already known…

THREAT REMOVAL
teslacrypt-4-2-version-sensorstechforum

TeslaCrypt 4.2 Released! Remove It and Try to Restore Your Files

It’s official! A new TeslaCrypt version has been just detected by security researcher BloodDolly, who has dedicated his time investigating the ransomware and searching for decryption methods. TeslaCrypt Version 4.2 Analysis and Description TeslaCrypt Version 4.2 has some changes in…

THREAT REMOVAL
yessearches-hobosearch-gfinder-sensorstechforum

Remove Extra Firefox Profile by GsearchFinder Browser Hijackers

Ad-supported and browser-hijacking software may not be malicious but it definitely can lead to serious consequences, if not removed on time. The more you postpone taking measures, the more vulnerable your system becomes to various forms of malware and spyware.…

CYBER NEWS

German Nuclear Plant Hit by W32.Ramnit and Conficker Worms

Ransomware has been hitting hospitals and putting the well-being of patients at risk for several months now. Attacking healthcare institutions is bad enough. What could be worse? India Times just reported that a nuclear plant in Germany has been infected…

CYBER NEWS
800px-Platinum-nugget

PLATINUM Team Exploits Microsoft’s Hotpatching, Remains Covert

Platinum Nugget. Image Source: Wikipedia There are basically two types of hacking teams. The first type is after quick profit, harvesting credit card numbers and banking details. The second type is more dangerous, even though it may not directly affect…

CYBER NEWS
cyber-police-ransomware-blue-coat-stf

Cyber.Police Android Ransomware Spread Without User Interaction

Image Source: Blue Coat Researchers at Blue Coat have discovered and analyzed a new mobile ransomware campaign that targets older Android devices and doesn’t require user interaction prior to infection. The campaign may be novel but the ransomware has been…

CYBER NEWS
beautiful-people-data-breach-stforum

BeautifulPeople(.)com Dating Site In a Major Data Breach Scandal

Remember the Ashley Madison hack from 2015? On 18 and 20 August, a hacking group called The Impact Team leaked more than 25 gigabytes of company data, user details included. Data breaches of that scale happen quite often and put…

CYBER NEWS
just-google-it-stforum

Ask Google: Is Your Googling As Good As It Could Be?

The search capabilities of the Big G are a lot more flexible and powerful than you may think. Just imagine how much more you could derive from Google, if you were aware of all the tips and tricks on improving…

THREAT REMOVAL
petya-ransomware-skull-art-acsii-master-boot-record-dropbox-unique

Remove Booyah Ransomware, CRIPTOSO.KEY

Security researchers analyze new ransomware pieces on a daily basis. The ransomware business is definitely thriving, one of its latest additions being the so-called Booyah ransomware. The name of the threat derives from its executable, booyah.exe. The ransom message comes…

CYBER NEWS
banking-malware-stforum

Panda Banker Distributed via Macros in Word Documents and EKs

Banking malware has evolved a lot during the last couple of years. New banking malware pieces keep on emerging, targeting banks all over the globe. The latest threat of the kind has been identified by researchers at Proofpoint and Fox…

THREAT REMOVAL
ransomware-virus

Remove TeslaCrypt 4.1b and Restore Your Files

Well-known and widely feared ransomware pieces such as TeslaCrypt and CryptoWall are constantly being improved and as a result, new versions are released. According to Bleeping Computer, TeslaCrypt 4.1b has just surfaced the Web, as a user has submitted a…

CYBER NEWS

RansomWhere? Offers Free Protection Against OS X Ransomware

Ransomware is the most vicious cyber threat currently affecting thousands of users on a global level. Mostly affected are users of Windows, being targeted by both sophisticated and simplistic ransomware pieces. However, OS X and Linux users are not spared…

CYBER NEWS
pexels-photo

Angler EK Now Distributes CryptXXX Ransomware and Bedep Malware

Image Source: Pexels.com Cyber criminals are constantly reinventing well-established methods to attack unsuspecting users. One of the most common attack paths is through compromised websites. Once the user has landed on such a website, he will then encounter an exploit…

CYBER NEWS
end-to-end-encryption-whatsapp

End-to-End Encryption, WhatsApp and the Next Big Thing in Cyber Security

No matter if you are an Apple fan or not, you have definitely heard or read about the dispute between FBI and Apple. Moreover, this dispute has triggered a strong wave of discussions about encryption in general, specifically end-to-end encryption.…

CYBER NEWS
image-captcha-facebook-blackhat-stforum

Facebook’s and Google’s CAPTCHAs Defeated!

CAPTHAs, or Completely Automated Public Turing test to tell Computers and Humans Apart, can be pretty annoying sometimes, but, in terms of online security, they are a necessary evil. Unfortunately, Google’s and Facebook’s CAPTCHA services have been broken down by…

CYBER NEWS
pexels-photo-67112

Let’s Google Google! Not so Popular Facts about The Search Engine

Image Source: Pexels.com Can you imagine your life without Google? Perhaps you can, perhaps you can’t. And perhaps it depends on whether you were born before or after Google was introduced to the world. Nonetheless, the truth is we use…

REVIEWS
maxresdefault

MacX HD Video Converter Pro for Windows Software Review

MacX HD Video Converter Pro for Windows (version 5.9.4) is an advanced tool for video conversion with an intuitive interface and great ease of use. A version for Mac users is also available. In both of its versions, MacX HD…

CYBER NEWS
password-brute-force-stforum

Brute Force Attacks – a Threat to Encryption

What Is a Brute Force Attack? Brute force attacks may sound like something very complicated but they are easy to explain and understand. However, the protection against them is not as easy to achieve. In the language of cyber security,…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree