Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 183

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

THREAT REMOVAL
Bucbi-ransomware-original-ransom-note-palo-alto-stforum

Bucbi Ransomware Revived, Distributed via Brute-Forcing RDP Accounts

Security researchers at Palo Alto Networks disclosed that an old ransomware family – Bucbi ransomware – has been just revived after 2 years of silence. The Bucbi threat was discovered in 2014, and it hasn’t been registered active since then.…

THREAT REMOVAL
ransomware-virus

Can I Remove CryptMix Ransomware and .code File Extension?

Ransomware cases usually follow the same pattern of infection and behavior. However, a recently detected ransomware proves that ransomware authors can be creative, too. The so-called CryptMix ransomware is operated by a group of individuals calling themselves the Charity Team.…

CYBER NEWS
shutterstock_94715374

Jaku Botnet Used in DDoS and Spam Campaigns, Employs Steganography

A previously unknown botnet campaign, named Jaku or JAKU has been investigated by researchers at Forcepoint Security Labs. The botnet has affected more than 19,000 computers, including them in its zombie network. Interestingly, most of the victims appear to be…

CYBER NEWS
users-security-password-day-stforum-pexels

Password Day 2016. Here’s How to Celebrate!

Did you know that Password Day is celebrated on May 5? IT celebrations such as this one make us consider the importance of acting on our online security. So, if you haven’t changed your password(s) in a while, make sure…

THREAT REMOVAL
Trojan-Horse

Backdoor:Win32/Kirts.A: Remove It and Protect Your System

An unauthorized backdoor access to your system can compromise it in many ways, downloading malicious software onto it being the worst one. Be alert, because a new backdoor identified as Backdoor:Win32/Kirts.A has been reported by security experts at Microsoft. The…

CYBER NEWS
hands-woman-laptop-notebook-large

Facebook Account Hijacked? The Best Security Tips to Fix It

Even though it’s a common fact that Facebook is often targeted by phishing scams and “viruses”, user accounts continue being hijacked and hacked. Shortly said, if you become a victim to a smartly crafted phishing email, someone, a crook, will…

THREAT REMOVAL
pressgamers-stforum

Can I Remove PressGamer(.)Com Ads and Stop Surveys?

Have you encountered a website called PressGamer(.)com? If you have visited this website and interacted with it, be alert, since you may have downloaded ad-supported software onto your system. The website may seem like a gamers’ page but in fact…

THREAT REMOVAL
ransomware-virus

Yakes Ransomware – Removal and Decryption Methods

Ransomware infections continue. Not only are new versions of well-known threats appearing, but also new ransomware cases are registered on a daily basis. One of the latest ransomware threats currently targeting users is dubbed Yakes. According to researchers, Yakes ransomware…

THREAT REMOVAL
petya-ransomware-skull-art-acsii-master-boot-record-dropbox-unique

New Locky Ransomware Attacks. TROJ_LOCKY.DLDRA Downloader

Locky ransomware has already affected thousands of users. Unfortunately, the threat is not nearly done with its infections, as new, more dangerous methods of distribution were just reported by security researchers at TrendMicro. The new techniques include the already known…

THREAT REMOVAL
teslacrypt-4-2-version-sensorstechforum

TeslaCrypt 4.2 Released! Remove It and Try to Restore Your Files

It’s official! A new TeslaCrypt version has been just detected by security researcher BloodDolly, who has dedicated his time investigating the ransomware and searching for decryption methods. TeslaCrypt Version 4.2 Analysis and Description TeslaCrypt Version 4.2 has some changes in…

THREAT REMOVAL
yessearches-hobosearch-gfinder-sensorstechforum

Remove Extra Firefox Profile by GsearchFinder Browser Hijackers

Ad-supported and browser-hijacking software may not be malicious but it definitely can lead to serious consequences, if not removed on time. The more you postpone taking measures, the more vulnerable your system becomes to various forms of malware and spyware.…

CYBER NEWS

German Nuclear Plant Hit by W32.Ramnit and Conficker Worms

Ransomware has been hitting hospitals and putting the well-being of patients at risk for several months now. Attacking healthcare institutions is bad enough. What could be worse? India Times just reported that a nuclear plant in Germany has been infected…

CYBER NEWS
800px-Platinum-nugget

PLATINUM Team Exploits Microsoft’s Hotpatching, Remains Covert

Platinum Nugget. Image Source: Wikipedia There are basically two types of hacking teams. The first type is after quick profit, harvesting credit card numbers and banking details. The second type is more dangerous, even though it may not directly affect…

CYBER NEWS
cyber-police-ransomware-blue-coat-stf

Cyber.Police Android Ransomware Spread Without User Interaction

Image Source: Blue Coat Researchers at Blue Coat have discovered and analyzed a new mobile ransomware campaign that targets older Android devices and doesn’t require user interaction prior to infection. The campaign may be novel but the ransomware has been…

CYBER NEWS
beautiful-people-data-breach-stforum

BeautifulPeople(.)com Dating Site In a Major Data Breach Scandal

Remember the Ashley Madison hack from 2015? On 18 and 20 August, a hacking group called The Impact Team leaked more than 25 gigabytes of company data, user details included. Data breaches of that scale happen quite often and put…

CYBER NEWS
just-google-it-stforum

Ask Google: Is Your Googling As Good As It Could Be?

The search capabilities of the Big G are a lot more flexible and powerful than you may think. Just imagine how much more you could derive from Google, if you were aware of all the tips and tricks on improving…

THREAT REMOVAL
petya-ransomware-skull-art-acsii-master-boot-record-dropbox-unique

Remove Booyah Ransomware, CRIPTOSO.KEY

Security researchers analyze new ransomware pieces on a daily basis. The ransomware business is definitely thriving, one of its latest additions being the so-called Booyah ransomware. The name of the threat derives from its executable, booyah.exe. The ransom message comes…

CYBER NEWS
banking-malware-stforum

Panda Banker Distributed via Macros in Word Documents and EKs

Banking malware has evolved a lot during the last couple of years. New banking malware pieces keep on emerging, targeting banks all over the globe. The latest threat of the kind has been identified by researchers at Proofpoint and Fox…

THREAT REMOVAL
ransomware-virus

Remove TeslaCrypt 4.1b and Restore Your Files

Well-known and widely feared ransomware pieces such as TeslaCrypt and CryptoWall are constantly being improved and as a result, new versions are released. According to Bleeping Computer, TeslaCrypt 4.1b has just surfaced the Web, as a user has submitted a…

CYBER NEWS

RansomWhere? Offers Free Protection Against OS X Ransomware

Ransomware is the most vicious cyber threat currently affecting thousands of users on a global level. Mostly affected are users of Windows, being targeted by both sophisticated and simplistic ransomware pieces. However, OS X and Linux users are not spared…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree