Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 182

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS
data-breach-stforum

A Data Breach Is a Breach in Trust. LinkedIn’s Version

Image Source: Stephencdickson/ Wikipedia LinkedIn’s data breach is already becoming one of the most controversial and troubling recent data incidents. And it proves that a data breach is definitely a breach in trust – between the vendor and the end…

CYBER NEWS
data-loss-prevention-data-breach-stforum

49 Weakest Passwords in LinkedIn’s Data Breach 2016

Have you changed your LinkedIn password yet? As we wrote yesterday, the popular social network for professionals has been through a major data breach. To sum it up, 167 million compromised accounts, of which 117 million credentials with hashed passwords…

CYBER NEWS
teslacrypt-ransomware-master-decryption-key

The End of TeslaCrypt – Master Decryption Key Available

TeslaCrypt ransomware has turned many users into victims. However, this ransomware story may be coming to its foreseeable end. According to an ESET researcher, the vicious file-encryption operation is now shut down. A free decryption key is available to anyone…

CYBER NEWS
get-windows-10-app-sensorstechforum

Get Windows 10 App Is Now Scheduled, Upgrade or Cancel

The Get Windows 10 App has caused many users many headaches. Because of its aggressive Get Window 10 campaign, Microsoft has been in and out of controversies for quite some time. Fortunately, the company has decided to change the way…

CYBER NEWS
linkedin-167-million-accounts-data-breach-stforum

LinkedIn Data Breach: 117 Million Accounts Up For Sale

If you’re a professional in any business area, there’s a big chance you have a LinkedIn account. So read carefully – LinkedIn has suffered a major data breach. The latter has apparently led to probable sale of sensitive information harvested…

CYBER NEWS
cisco-logo-CVE-2016-1379-CVE-2016-1385

Cisco Patches ASA Software against CVE-2016-1385, CVE-2016-1379

If you’re a user of Cisco’s Adaptive Security Appliances (ASAs), you should probably have a look at their latest patches. The patches are addressing two separate issues, CVE-2016-1385, a flaw in the ASA XML parser, and CVE-2016-1379, a VPN block…

CYBER NEWS
p12_0000

Pornhub in a Server Breach Hoax, Hacker’s Claims Rated Bogus

Shortly after Pornhub announced their Bug Bounty program, a gray hat hacker known as Revolver released claims that the website’s web server was compromised. Were his claims true or just a cry for attention? Let’s see. Read More about PH’s…

CYBER NEWS
google-certificate-Redirector.Paco

Redirector.Paco Clickbot Steals Millions of AdSense Revenue

Bitdefender security researchers have discovered a clickbot, dubbed Redirector.Paco which has continuously abused companies’ Google advertising revenues. Cristina Vatamanu, Răzvan Benchea, and Alexandru Maximciuc have discovered that the botnet’s start of activity dates back to September 2014. Since then, over…

CYBER NEWS
symantec-exploit-tavis-ormandy

Symantec/Norton CVE-2016-2208 Flaw Causes Remote Memory Corruption

Software products are not perfect and can be full of vulnerabilities, anti-virus software included. Bug hunters and white hats are usually the ones to disclose flaws in applications, and to notify the vendors so that a fix is implemented. If…

CYBER NEWS
google-chrome

Google Chrome’s HTML5 by Default Pushes Flash Player Aside

Vulnerabilities in Adobe’s Flash Player may seem trivial but yet they are among the flaws mostly leveraged by attackers. Perhaps that’s a reason good enough for Google to decide to make HTML5 the primary standard in Chrome. Only 10 white-listed…

CYBER NEWS
shutterstock_271501652

WhatsApp’s End-to-End Encryption Prone to SS7 Vulnerabilities

WhatsApp’s recent adoption of end-to-end encryption was a big deal in the cyber security community. However, a research conducted by Positive Technologies reveals that the end-to-end encryption in services such as WhatsApp and Telegram is vulnerable. More specific, researchers have…

REVIEWS
hacker-sensorstechforum

5 Computer Security Issues That Should Concern You

Being cyber-educated is more important than ever. Let’s put it this way. The less you know about the dangers of cyber space, the more susceptible you become to malicious attacks. And vice versa, the more acquainted you are with attackers’…

CYBER NEWS
pexels-photo

Windows Zero-Day Exploited to Steal Credit Card Data from US Companies

CVE-2016-0167, a zero-day exploit addressed in April’s Patch Tuesday, has apparently been leveraged by attackers, FireEye research reveals. Cyber criminals have exploited the vulnerability in targeted attacks on more than 100 US companies. FireEye’s blog post on the matter discloses…

CYBER NEWS
night-television-tv-theme-machines

Pornhub’s Bug Bounty Program Protects P0rn Fans from Malvertisers

Many big companies and vendors have bug bounty programs which encourage independent researchers in locating and disclosing vulnerabilities. Pornhub has just joined the bug bounty initiative, as it just launched a program on HackerOne’s platform, which aims to protect and…

CYBER NEWS
CVE-sensorstechforum

7-Zip and the Not-So-Hidden Dangers of CVE-2016-2335 Flaws

You’re most likely familiar with 7-Zip, the open-source file archiving application that offers optional AES-256 encryption, support for large files, and the capacity to use all kinds of compression, conversion and encryption methods. The app is also suitable for Windows…

CYBER NEWS
p17_0000

Vishing, Smishing, and Phishing Scams Are After Your Information and Money

If you’re a daily reader of IT security and tech news, you have a good idea of phishing and spear phishing attacks. Nonetheless, even if you’re perfectly acquainted with these widely deployed social engineering schemes, you should be on the…

CYBER NEWS
windows-update-restart-now

May 2016 Patch Tuesday: CVE-2016-0189, KB3155533, KB3156764

Microsoft has just released its security updates for May 2016. And they’re quite major! Two zero-days vulnerabilities have been disclosed, and they’re both crucial – one in Windows, and one in Adobe’s Flash Player. Security experts warn that the Windows…

CYBER NEWS
Viking-Horde-Image

Viking Horde Android Malware in Viking Jump and 4 Other GP Apps

Image Source: https://blog.checkpoint.com/ Viking Horde is not a character from your favorite TV show but a new malware family currently creeping around Android devices. Security researchers at CheckPoint just released a report uncovering the new malware and the dangers it…

CYBER NEWS
malicious-threat-sensorstechforum

PerezHilton.Com, Angler EK and CryptXXX in One Sentence Is Never Good

If you’re a daily visitor of PerezHilton.com, you may be in trouble. It’s been reported that the pop and celebrity news website has compromised some of its 500,000 visitors with the Angler exploit kit, and then with the devastating CryptXXX…

CYBER NEWS
1ly4wkA

Google Data Breach Triggered by a Human Error

Google has been breached! Did we catch your attention? Any news concerning Google and a data breach is worth your full attention. It proves that no company is invincible, Google included. So, what exactly happened? More about Google: Google Knows…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree