Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 173

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS
nokia-memes

Connecting People Round 2: Two Nokia Android Smartphones In the Making

Do you know a person who hasn’t owned a Nokia? Well, we don’t, and apparently the Nokia trend is about to be revived. According to the website NokiaPowerUser, two Nokia Android phones are being developed at the moment, as per…

CYBER NEWS
tumblr_n4e19igfqt1tz7aq7o1_500

Dyre, Dridex Money Laundering Scheme Ends with 14 Arrests

Follow the money – that’s basically the one rule you need to apply to get to the bottom of… everything, including malware. That being said, the UK National Crime Agency (NCA) not only did follow the money but also arrested…

CYBER NEWS
ransomware-damage-stforum

Locky Ransomware Befriends the Bizarro Sundown Exploit Kit

Locky ransomware is back once again, this time being spread by a new exploit kit, based on the previously known Sundown. The new exploit kit is dubbed Bizarro Sundown and was first noticed on October 5 and then again on…

CYBER NEWS
vulnerability-stforum

XSS Bug Found on Wix.com Platform, Built on Open-Source WordPress Library

Have you heard of wix(.)com? Wix.com is a cloud-based web development platform designed for users to build HTML5 web sites and mobile sites through the use of the company’s online drag and drop tools. Unfortunately, a serious XSS bug has…

CYBER NEWS
update-system-health-stforum

Device Security, Vulnerabilities, and Windows

Personal security usually starts with your device. The more unsecure devices are out there, the better is the mechanism behind data breaches and malware infections. So, if you want to be safe and sound, start with your device. Device Security…

CYBER NEWS
shutterstock_270593417

Symantec Endpoint Protection 14 Is All about Machine Learning

Artificial intelligence is changing all aspects of the modern life, our online security included. Machine learning in particular is making its way to forever altering the mechanisms of endpoint protection. The future is literally happening at this very moment, as…

CYBER NEWS
google-monopoly-protonmail

Google Monopoly: ProtonMail Mysteriously Disappeared from Search Results

ProtonMail and Google are in the midst of an altercation. Shortly put, the encryption-savvy company says that Google may have attempted to affect the way ProtonMail shows up in search results. ProtonMail has been attracting more users with its encrypted…

CYBER NEWS
australian-red-cross-stforum

Australian Red Cross Data Breach: 550,000 Blood Donors Exposed

There’s not a single organization that isn’t susceptible to data compromises. The list of various organizations and services that have been through data breaches is getting longer on a daily basis. And now, apparently, the Australian Red Cross should be…

CYBER NEWS
update-system-health-stforum

CVE-2016-7855 Flash Bug Exploited in Limited Attacks

Meet CVE-2016-7855, yet another Adobe Flash Player vulnerability of the zero-day type. Adobe has already released a security bulletin, APSB16-36, addressing the issue in versions of Flash from 23.0.0.185 and earlier affected by the flaw. Linux users should keep in…

CYBER NEWS
iot-security-environment-stforum

A Secure IoT Environment Means Secure Life

“In the next century, planet Earth will don an electronic skin. It will use the Internet as a scaffold to support and transmit its sensations. This skin is already being stitched together. It consists of millions of embedded electronic measuring…

CYBER NEWS
vulnerability-stforum

CVE-2016-5195 Found in Every Linux Version (for the Last 9 Years)

CVE-2016-5195 is a Linux vulnerability in the wild which is most likely found in every Linux version for the last nine years. Linux users should consider installing a security patch immediately. The vulnerability is a Kernel Local Privilege Escalation one…

CYBER NEWS
phone-communication-call-select-privacy-mi5-stforum

I Spy: GCHQ and MI5 Unlawfully Collected Bulk Data on UK Citizens

Would anyone be surprised with the news that the U.K.’s spy agencies (GCHQ and MI5) breached the European Convention on Human Rights (ECHR) by covertly collecting bulk data about British citizens’ communications (content excluded)? This is exactly what a U.K.…

CYBER NEWS
trojan-infected

TrickBot Banking Trojan Is Here to Replace Dyre

Meet TrickBot, a relatively new banking Trojan believed to be a close relative of the old Dyre banker. According to researchers at Fidelis Cybersecurity, TrickBot, detected in September 2016 has a lot in common with Dyre. In case you don’t…

CYBER NEWS
pexels-photo-175729

Would You Take a Selfie for Acecard Android Trojan?

The Acecard Android Trojan has been around for quite some time. We wrote about Acecard in February this year, but in fact the malware has been attacking devices since 2014, when it was first detected. Back in February, the Trojan…

CYBER NEWS
malware

Linux/NyaDrop: New Malware on the IoT Horizon

There’s a new Linux Trojan, dubbed Linux/NyaDrop, and it’s already reverse engineered by MalwareMustDie. This is in fact the same researcher that discovered Mirai. The Mirai IoT botnet was used in multiple attacks and had a global infection rate. The…

CYBER NEWS
backdoor-access-stforum

Foxconn Firmware in Android Devices May Allow Backdoor Access

Android may also be prone to backdoor access – through a debugging feature in the OS bootloader. However, only devices that have firmware developed by Foxconn appear to be inclined to this vulnerability. The OS bootloader can act as a…

CYBER NEWS
shopping-online-skimming-malware-stforum

5,761 Online Stores Infected with Malware, Admins Don’t Care

2016 has seen the highest rates of malware in terms of online shops running on platforms such as Magento and OpenCart. To conclude that, researcher Willem de Groot from Byte.nl has been analyzing online stores infected with malware since November…

CYBER NEWS
dream-market-bitcoin-stforum

Dream Market Is Number 1 for Illegal Bitcoin Trade

A new case study by blockchain analytics startup Skry and infosec firm Terbium Labs has analyzed millions of URLs in order to outline the most popular sites for illegal Bitcoin trade. The researchers were also able to identify the most…

CYBER NEWS
vulnerability-stforumm

BIND Vulnerability CVE-2016-2776 Could Cause DoS Attacks

Critical vulnerabilities are often leveraged in attack scenarios, varying from denial-of-service to malware infiltration cases. A serious vulnerability was recently patched, the kind that would allow attackers to carry out denial-of-service attacks via the Berkeley Internet Name Domain (BIND) exploits.…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree