Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 171

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS

Money Stolen via BEC Scams Funneled to Banks in China and Hong Kong

The Continuous Growth of BEC Scams Demonstrated in the Latest FBI Report BEC (Business Email Compromise) scams have grown to the staggering rate of 2,370 percent in the last couple of years, as reported by the FBI. The latest FBI…

CYBER NEWS

Hackers Exploit SS7 and mTANs to Drain Bank Accounts

Signaling System No. 7 known as SS7 has been exploited by hackers in attacks designed to steal money from victims’ online bank accounts. SS7 is a set of telephony signaling protocols developed in 1975, which is used to set up…

CYBER NEWS

Android Users, How Much Do You Know about Ultrasonic Tracking?

Have you heard of ultrasonic tracking? You may not be aware of it but it doesn’t mean you aren’t subjected to it. As discovered by researchers at Technische Universit at Braunschweig Brunswick, Germany, more and more Android applications are listening…

CYBER NEWS

DDoS Attacks Cost Organizations $250,000 per Hour

A new report by Neustar shows that DDoS attacks are quite expensive and cost organizations more than $2.5 million in revenue. Barret Lyon, Head of Research and Development at Neustar, called these attacks “the zeitgeist of today’s Internet”, and highlighted…

CYBER NEWS

The Brands Mostly Affected by Phishing and Domain Spoofing

A new report by DomainTools reveals the names of the retail companies that are the most frequent victims of phishing. These brands are abused by scammers who create look-alike domains to harvest users’ details. According to the researchers, brands like…

CYBER NEWS

Malware Hunter Locates the Command and Control Centers of Botnets

Malware Hunter is the name of a brand new tool created by threat intelligence company Recorded Future and Shodan, the search engine for IoT devices. The tool is in fact an online crawler designed to block communications between malware and…

CYBER NEWS

Reconyc Trojan Found on USB Drives Shipped with IBM Storewize

IBM is alerting customers to get rid of USB drives shipped with some of its Storewize storage systems as the devices may contain malware identified as part of the Reconyc Trojan (Trojan.Reconyc) family. It is best if the USB drives…

CYBER NEWS

OSX.Dok Mac Malware Could Impersonate Any Website

Researchers have unearthed a new sample of Mac Malware which is more sophisticated and insidious than previously discovered pieces. The malware has been dubbed OSX.Dok or Dok Malware, and has been used in attacks on European users, targeted via convincing…

CYBER NEWS

INTEL-SA-00075: Intel Platforms from Nehalem to Kaby Lake Remotely Exploitable

Intel’s Active Management Technology (AMT), Standard Manageability (ISM), and Small Business Technology (SBT) firmware has been found to be vulnerable to escalation of privilege flaws that could lead to remote control. Intel has identified the flaws as INTEL-SA-00075. Related: The…

CYBER NEWS

8,400 New Malware Samples Daily for Android Users

Are you an Android device user? If so, you should be extremely cautious not to become a victim of malware hiding in app stores. Security researchers at G Data say that 750,000 new Android malware apps have been discovered only…

CYBER NEWS

Verizon’s Data Breach Investigations Are Your Biggest Security Nightmare

Another report today is indicating the steady growth of ransomware attacks, as well as the increasing danger of cyberespionage. According to Verizon, organizations in manufacturing, the public sector and education are frequent targets of cyberespionage. At least 90% of 289…

CYBER NEWS

In 2017, Most Users Remain Completely Unaware of Ransomware

One of the most important questions to ask when dealing with ransomware cases is whether victims pay the demanded ransom. Apparently, about 40% of these victims pay the ransom to get their files decrypted, a new report by Trustlook says.…

CYBER NEWS

Linux/Shishiga Malware Brute-Forces SSH Credentials

A new strain of Linux malware has been detected. Dubbed Linux/Shishiga, the malware could transform into a dangerous piece of malware. Linux/Shishiga was officially discovered and examined by researchers at Eset. “Among all the Linux samples that we receive every…

CYBER NEWS

KB4016240 May Cause Installation Issues for Some Users

Windows 10 cumulative update KB4016240 for systems running the Creators Update is already a fact, and there are some users having problems with it. First of all, what is the update all about? It is a non-security update that “includes…

CYBER NEWS

FalseGuide Malware Connects Android Devices to Adware Botnet

Android users have once again been targeted by malware that sneaked in Google Play Store. The malware in question has been identified as FalseGuide, discovered by security researchers at CheckPoint. FalseGuide was hidden in more than 40 fake companion guide…

CYBER NEWS

When Your AV Fails: Webroot Flags System Files as W32.Trojan.Gen

Are you running Webroot antivirus? If so, you may have encountered some issues with it. A malware signature update recently issued by Webroot is the reason for the program flagging Windows system files as malicious. This mistake has led to…

CYBER NEWS

6 Billion Attempted Malware Attacks Identified In a Year, Report Says

NTT Security has just released its 2017 Global Threat Intelligence Report which focuses on global threat trends based on log, event, attack, incident and vulnerability data. The report concentrates on the latest ransomware cases, phishing and DDoS attacks which shape…

CYBER NEWS

8,800 Command and Control Servers Discovered in ASEAN, Interpol Says

According to the Interpol, thousands of compromised systems have been uncovered in ASEAN (Association of Southeast Asian Nations. The systems included Command and Control servers that were infected with malware. An Interpol-led operation targeting cybercrime across the ASEAN region has…

CYBER NEWS

Delta Air Lines Phishing Email Downloads Hancitor Malware

Another phishing campaign has been discovered by Heimdal researchers, taking advantage of Delta Air and downloading Hancitor malware. The potential victim receives an email disguised as a payment confirmation email from the company. Your Order with Delta Air Lines Has…

CYBER NEWS

Your Linksys Smart Wi-Fi Router Model Could Be Vulnerable

Are you the owner of a Linkys Smart Wi-Fi router? Then pay attention to this article. Researchers from IOActive recently unveiled that 25 models router models are vulnerable to dangerous attacks that could compromise the owners in the worst possible…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree