Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 176

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS
Mr-Robot-whiterose-culturageek.com_.ar_

Mr. Robot Season 2 Hacks and Exploits: CrackSIM and Crack Theories!

Have you been impatiently looking forward to Mr. Robot’s second season? Do you always have questions about the hacks that take place during the show? Are you often pausing to have a closer look at what’s written on that PC…

THREAT REMOVAL
STF-dns-unlocker-2016-adware-ads-main-site-page

Why Can’t I Remove DNS Unlocker?

DNS Unlocker has been around for a few years now, and still continues to be one of the most persistent adware pieces in the wild. In 2017, catching an intrusive and persistent potentially unwanted program like DNS Unlocker continues to…

CYBER NEWS
malware-attack-sensorstechforum

CSRF Flaw in Yandex Browser Could Lead to Personal Data Theft

Many services we use on a daily basis turn out to be quite buggy. This time our attention was caught by a vulnerability in the Yandex Browser, built on Chromium, which could have allowed attackers to steal users’ browsing history,…

CYBER NEWS
mirrorlink

Cars Connected to Smartphones Prone to Hacks, Research on MirrorLink Says

MirrorLink by Connected Car Consortium is the first industry standard for connecting smartphones to in-vehicle infotainment systems (IVI). A recent comprehensive research, titled ‘A Security Analysis of an In Vehicle Infotainment and App Platform’ and carried out by Damon McCoy,…

CYBER NEWS
p17_0000

Why Did I Click on That Phishing Link? Why, Indeed?

Have you ever clicked on a random link in your inbox or in a Facebook message? Despite knowing the risks? Well, you are not alone! A study by researchers at Friedrich-Alexander University (FAU) of Erlangen-Nuremberg, Germany, discovered that people still…

THREAT REMOVAL
decrypt-ransomware-stforum

.cerber3 Virus Files: Can I Restore Them?

Cerber3 ransomware virus is already a fact, as accountable by several tweets by security researchers. The crypto virus is most likely appending the .cerber3 extension to victims’ encrypted files. The ransom note is titled # HELP DECRYPT #.txt. Not too…

CYBER NEWS
have-i-been-pwned-twitter-stforum

71,000 Minecraft World Map Accounts Breached, Troy Hunt Says

Troy Hunt, owner of HaveIBeenPwned, just reported that 71,000 user accounts and IP addresses have been leaked from a Minecraft fan website (minecraftworldmap(.)com). The dumps include email addresses, IP addresses, usernames and passwords associated with that site. The leaked passwords…

CYBER NEWS
remote-access-trojan-sensorstechforum

Ozone RAT Spread in Massive Spam Campaign

A new spam campaign delivering the Ozone RAT has been detected targeting German-speaking users. The attack is spread via malicious Office documents. However, instead of the well-known macro malware, the operation ends with the installation of Ozone. Interestingly, users are…

CYBER NEWS
vulnerability-stforum

Bug in Google Login Pages Can Cause Malware Download

Imagine there is a currently exploitable bug in Google. Well, truth is you don’t need to imagine it because it is already there! British security researcher Aidan Woods just disclosed an issue found on Google’s login page. This issue enables…

CYBER NEWS
ransomware-quote-stforum

Privileged Users Are the Riskiest in an Organization, Security Survey Says

An industry analyst report by Forcepoint and Ponemon Institute, titled “The 2016 Study on the Insecurity of Privileged Users” has come to some troubling revelations. The study is based on results of a recent survey of some 704 IT operations…

CYBER NEWS
ransomware-file-encryption-640-366

Open-Source Ransomware Based on Hidden Tear and EDA2 on the Loose

Open-source ransomware is a real issue which is continuously evolving. Over the past few weeks, researchers have caught three open-source crypto virus strains, based on Hidden Tear and EDA2. What all of the three strains have in common is that…

CYBER NEWS
malware-infections-stforum

Linux.PNScan Malware Brute-Forces Linux-Based Routers

September is expected to be a month riddled with malware. We have already seen several banking Trojans, some new and some renewed, and a strong wave of CrySiS/ Troldesh ransomware variants. However, this is far from everything happening on the…

CYBER NEWS
botnet-botnet-sensorstechforum

Android/Twitoor: the First Twitter-Controlled Botnet

Have you ever thought that a botnet of Android devices could be controlled via Twitter? This is no longer a theory because it has already happened, as disclosed by researchers at ESET. The botnet, dubbed Android/Twitoor or just Twitoor is…

CYBER NEWS
how-fast-can-malware-spread-across-town-stforum-

GozNym Banking Trojan August 2016 Version Attacks German Banks

GozNym, the banking Trojan that was detected in April 2016, has been just caught once again in a new active campaign. This time victims of the banker are German users. Researchers at IBM X-Force say that the Trojan has been…

CYBER NEWS
ransomware-cyber-security-quote-stforum

63% of UK Universities Attacked by Ransomware, FOI Request Reveals

Ransomware has moved from targeting hospitals to targeting universities. According to SentinelOne, six out of ten British universities have fallen victim to crypto virus attacks. The security firm has sent a FOI (Freedom of Information) request to 71 higher educational…

CYBER NEWS
ms-bts-zimperium-research-stforum

BTS Vulnerabilities Endanger GSM Security, Research Shows

A base transceiver station (BTS) is a piece of equipment that aids wireless communication between user equipment (mobile phones, WLL phones, computers with wireless connectivity) and a network, such as wireless communication technologies like GSM, CDMA, wireless local loop, Wi-Fi,…

CYBER NEWS
top-20-cyber-security-quotes-sensorstechforum

Top 20 Cyber Security Quotes to Guide You In the Wild

Does cyber security concern you? You may think not, but think twice! How secure is your data? Has the company you’ve been working for ever been hacked? Do you use public Wi-Fi? Have you backed up your data? Are you…

CYBER NEWS
warning-trojan-BackDoor.TeamViewer.49

Rio Malware 2016: Trojan-Proxy.PowerShell.Agent.a

Besides ransomware, this month has seen some older banking Trojans equipped with new variants as well as completely new pieces. The latest banking Trojan that has been lurking around uses Microsoft PowerShell to change the victim’s PC local proxy settings…

CYBER NEWS
bitcoin and ransomware chicken or the egg

Bitcoin and Ransomware, Chicken or the Egg

“You can’t stop things like Bitcoin. It will be everywhere and the world will have to readjust. World governments will have to readjust” – John McAfee, Founder of McAfee The symbiotic relationship between Bitcoin and ransomware has sparked heated debates,…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree