Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 175

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS
warning-trojan-BackDoor.TeamViewer.49

Linux.Mirai Trojan Carries Out DDoS Attacks

Linux.Mirai is a new Trojan recently found to be at fault for DdoS attacks. The malware was first registered in May, 2016, when it was detected by Dr. Web. Back then, it was added to the company’s virus databases under…

CYBER NEWS
malware-infections-stforum

CONFUCIUS Malware Uses Quora and Yahoo Pages in Novel Attacks

CONFUCIUS is a new malware detected by Palo Alto Network researchers. It’s a backdoor that displays quite the creativity on the cybercriminals’ side. The researchers have analyzed two samples of the malware, taken from two separate cyber espionage campaigns. In…

CYBER NEWS
hacker

US Voter Registration Systems at Risk of (Russian) Hacking

The U.S. Federal Bureau of Investigation has found more attempts to hack the voter registration systems of states, ahead of national elections. The agency had reportedly found evidence in August that foreign hackers had breached state election databases in Illinois…

CYBER NEWS
apple-search-ads-sensorstechforum

iPhone Users Will Now See Search Ads

If you’re an iPhone or iPad user (and an Apple follower), you may want to know that owners of the devices will soon see ads when using the Search option in the App store. The ads will appear at the…

CYBER NEWS
europol-2016-report-stforum

Top 5 Cybercrime Trends in 2016 According to Europol

Have you been wondering which today’s most prevalent cybercrime threats are? Europol has just released a vast, 72-page report called the Internet Organized Crime Threat Assessment which gives quite a detailed answer. Crime-as-a-Service According to Europol, the malware market has…

CYBER NEWS
vulnerability-header-stforum

Google Releases 2 New Dev Tools to Protect against XSS

Google has just released two new tools for developers with the purpose to shield web domains from XSS scripting vulnerabilities. XSS, or cross-site scripting, is a common issue in cybersecurity. An XSS-powered attack takes place when malicious actors implement malicious…

CYBER NEWS
malware

Which Is the Most Popular Exploit Kit in 2016?

Changes in the exploit kit market indicate that currently RIG is the most deployed EK service. Apparently, RIG is taking the place of Neutrino. Since the death of Angler, the two exploit kits have been battling for the lead positon…

CYBER NEWS
antiransomware-protection-stforum

Virlock Ransoware Leverages the Cloud to Infect More Users

Virlock ransomware has apparently been updated and is now capable of propagating itself via the cloud. Hence, the ransomware can be spread negligently from one infected to another, eventually file-locking an entire network. This update seen in the code of…

CYBER NEWS
botnet-operations-stforum

Biggest DDoS Close to 1 Tbps Hits Hosting Company

OVH is a hosting company that has apparently been a victim of the biggest DDoS attack ever registered. The attack is said to have surpassed the DDoS on KrebsOnSecurity. A tweet by the company’s CTO, Octave Klaba, reveals that “you…

CYBER NEWS
mac-stforum-header

Komplex Trojan for OS X Works Just Like the Windows Carberp Trojan

Komplex is, according to security researchers at Palo Alto Networks, a new Trojan for Mac OS X, which is believed to be linked to the activities of Sofacy (also known as APT28, Pawn Storm, Fancy Bear, and Sednit), a Russian…

CYBER NEWS
mimikatz-stforum

Microsoft Edge Application Guard Will Protect against the Mimikatz Tool

Windows Defender Application Guard for Microsoft Edge is Microsoft’s latest attempt to improve the security of its browser and respectively Windows 10. The new addition will run Edge in a lightweight virtual machine. Shortly said, the application is powered by…

CYBER NEWS
giphy

Trump Hotel Chain Exposes 70,000 Credit Card Numbers

Trump Hotel Collection, the hotel chain of Republican presidential candidate Donald Trump, has apparently exposed personal information of customers in hacks. Over 70,000 credit card numbers and other PII details have been leaked. The hotel chain has agreed to pay…

CYBER NEWS
shutterstock_482126278

2016 and Beyond, Where Is Bitcoin Headed?

A judge recently ruled that Bitcoin is a means of payment and therefore it qualifies as money: Bitcoins are funds within the plain meaning of that term. Bitcoins can be accepted as a payment for goods and services or bought…

CYBER NEWS
twitter-biannual-transparency-report-2016

Twitter Transparency Report 2016: 5,676 Government Information Requests Received

Have you heard of Twitter’s biannual transparency report that analyzes the legal requests received in regards to user information? Well, the second biannual report for 2016 is already a fact and it definitely should be read carefully. I haven’t read…

CYBER NEWS
trojan

RAUM Tool: Torrents Dropping Malware and Ransomware

If you download torrents, this news definitely concerns you. InfoArmor researchers have just disclosed Raum – a tool employed by Eastern European organized cybercrime group Black Team to spread malware via malicious torrents. The malware currently distributed in the campaign…

CYBER NEWS
dna-computer-microsoft-stforum

Microsoft Builds a DNA Computer, Says Cancer Is a Computational Problem

Cancer is the physiological threat of the 21st century. However, technology may turn out to be the key for solving the deadly case of cancer. Microsoft has recently promised to “solve the problem of cancer” by using ground-breaking computer science…

CYBER NEWS
peekasso-mr-robot-gif

Mr. Robot Reality Hacks: A Philosophical Viewpoint

Mr. Robot is beginning to feel a lot more like a philosophical essay on life rather than a hacking TV show, with Satie’s Gnossienne played in the background. It is perhaps not a coincidence that I have been reading Sci-Fi…

CYBER NEWS
SensorsTechForum-Bitcoin

Bitcoin Cryptocurrency Qualifies as Means of Payment, a.k.a. Money

Does Bitcoin have the value of (physical) money? This question hangs around us as Bitcoin is becoming more popular and profitable. With the reshaping and readjustment of cybercrime, the cryptocurrency has turned into the means of profit for malware coders,…

CYBER NEWS
bec-scams-2016-stforum

BEC Scams: Emails That Bankrupt Businesses

According to the FBI, a BEC scam, or a Business Email Compromise scam, is a sophisticated online fraud that targets businesses working with foreign suppliers and regularly performing wire transfer payments. Also known as a Man-in-the-Email scam, BEC has turned…

CYBER NEWS
exploit-kit-malware-user-stforum

Top 3 Vulnerabilities Used in 2016 Exploit Kit Attacks

A new research conducted by Digital Shadows reveals that 76 vulnerabilities are being exploited in exploit kit attacks. 27 of them are found in Flash. Despite the popularity of Flash flaws, an IE bug prevails in most attack scenarios and…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree