Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 169

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS

Samsung and Google to Work Together on AI Technology

Samsung recently confirmed its AI virtual assistant named Bixby. Bixby is about to be one of Galaxy S8 selling points, and this should come to no one’s surprise. Manufacturers are following the AI trend and are actively including such technology…

CYBER NEWS

The Chinese Firewall about to Embark on VPNs

China is officially transforming the Great Wall into the Great Firewall. On Sunday, January 22, the Chinese Ministry of Industry and Information Technology published a statement on its official website stating that government officials are about to start “cleaning up”…

CYBER NEWS

3-Day-Long DDoS Attack Hits Lloyds Bank

In 2016, DDoS attacks have been one of the biggest threats to organizations, and the trend is expected to continue in 2017. That being said, Lloyds Bank’s incident is the first reported case of a 3-day-long DDoS attack that crashed…

CYBER NEWS

Locky File Virus 2017: Beware Emails with Twice-Zipped Attachments

Locky file virus, or Locky ransomware, is being spread once again the wild, Cisco researchers warn. Apparently, a new spam campaign has been detected and even though its scale is small, users should be prepared for ransomware. Cisco has just…

CYBER NEWS

Fruitfly, the First Mac Malware for 2017 Cracked by Researcher

Even though Microsoft dominates the desktop market, malware authors are starting to pay more and more attention to Mac OS. Apple’s operating system is also prone to vulnerabilities, and attackers have succeeded in exploiting them throughout the past two years.…

THREAT REMOVAL

.HakunaMatata Files Virus (Restore Files)

.HakunaMatata file virus, also known as HakunaMatata ransomware, is a ransomware infection that encrypts the victim’s files and appends the .HakunaMatata extension once the encryption is finalized. The cryptovirus will then display a ransom note containing instructions on the payment…

CYBER NEWS

Oracle Has Fixed 270 Security Flaws in Its Products

Oracle’s first quarterly critical dose of patches has been released. Customers are compelled to apply all of the 270 fixes to the corresponding products. Oracle Has Issued 270 Fixes The vast update includes products like Oracle Database Server, Oracle Enterprise…

CYBER NEWS

Previously Patched Facebook Remote Code Execution Bug Deemed Exploitable

A security researcher, Andrew Leonov, has been awarded $40,000 on behalf of Facebook for breaching the social network and fixing a remote code execution vulnerability. The researcher succeeded in cracking Facebook by using an ImageMagick flaw. Related: Facebook Bug Reveals…

CYBER NEWS

iWatch Install.php Flaw in Samsung Smartcam Allows Root Access

Another day, another vulnerability! This time the culprit is Samsung Smartcam. The flaw, dubbed iWatch Install.php vulnerability, could allow attackers to gain root access to the device and control it remotely. The iWatch Install.php Samsung Smartcam Vulnerability Explained What is…

CYBER NEWS

Gmail Phishing Attacks 2017: How to Recognize the Scam

Gmail phishing attempts have been registered. Security researchers at Wordfence have detected a highly effective and massively spread phishing technique stealing login credentials for Gmail and other services. Apparently, during the last couple of weeks, tech-savvy users compromised by the…

CYBER NEWS

Scott Schober: Hackers, Like Terrorists, Play on Our Fears

Reading a cybersecurity book may not sound like something entertaining. Scott Schober’s Hacked Again, however, proved that a book covering a very serious topic could be fun to read. Written in a light and easy-to-understand style, the book reveals Mr.…

CYBER NEWS

MJ Freeware Software Platform for Cannabis Targeted by Attackers

Marijuana shops running MJ Freeware software platform for cannabis business are the latest targets of attackers. The activity of marijuana online shops has been disrupted due to attacks against the software used for sales and inventory, Boston Globe reported. Related:…

CYBER NEWS

Beware! Amazon Phishing Scam Lures Victims with Unbeatable Prices

Amazon has once again been targeted by scammers in a smart phishing scam. Crooks are targeting Amazon buyers and are either setting up independent seller accounts or hijacking reputable existing ones. Once this is done, scammers offer expensive items at…

CYBER NEWS

Los Angeles College Paid a $28,000 Ransom and Got the Decryption Key

Paying the ransom only fuels ransomware authors. Many reports proved this claim true but still 2017 starts off with a big ransom being paid by a Los Angeles Valley College. The college’s computer network got hit, and as a result…

CYBER NEWS

Paying the Ransom Only Fuels Cybercrime, Report Stats Reveal

Businesses have become a dominant target of ransomware attacks. According to a report by Radware, 49% of businesses have confirmed being the victim of a ransomware operation in 2016. Other 47% percent reported that ransom was the primary incentive of…

CYBER NEWS
software-vulnerability-sensorstechforum

Two Microsoft Edge Bugs Integrated by Sundown EK Authors

Microsoft has been advertising Microsoft Edge as the most secure browser but is this really true? CVE-2016-7200 and CVE-2016-7201 are two vulnerabilities found in the Chakra JavaScript engine in Edge. They were reported last November and fixed by Microsoft. One…

CYBER NEWS

MongoDB Ransomware Attacks Misconfigured Servers

Misconfigured MongoDB databases are the latest targets hence victims of ransomware. Successful attacks against MongoDB have doubled within a single day, researchers say. Servers running MongoDB were first targeted in December 2016, but the scale of the malicious attempts was…

CYBER NEWS

Dr. Roman Yampolskiy: AI Has Tremendous Ability to Help in All Domains of Interest

Dr. Roman Yampolskiy has dedicated his career to the study of artificial intelligence, particularly AI safety. Being a scientist in the field of AI also requires a philosophical understanding of the subject, and Dr. Yampolskiy isn’t afraid to explore. His…

CYBER NEWS

KillDisk Linux Version Demands Huge Ransom, Fails to Provide Decryption

We recently wrote that the KillDisk malware became capable of encrypting data. A newly discovered variant of the malware could act like ransomware to demand money in exchange for decryption. A Linux variant of KillDisk was discovered by ESET researchers.…

CYBER NEWS

Android Tops the 2016 Top 50 Vulnerabilities List with 523 Bugs

CVE Details has released a detailed list of the top 50 products and vendors mostly affected by vulnerabilities in 2016. In terms of products, the compilation is led by Google’s Android, which has reported a total of 523 vulnerabilities. However,…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree