Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 183

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS
mac-stforum-header

Komplex Trojan for OS X Works Just Like the Windows Carberp Trojan

Komplex is, according to security researchers at Palo Alto Networks, a new Trojan for Mac OS X, which is believed to be linked to the activities of Sofacy (also known as APT28, Pawn Storm, Fancy Bear, and Sednit), a Russian…

CYBER NEWS
mimikatz-stforum

Microsoft Edge Application Guard Will Protect against the Mimikatz Tool

Windows Defender Application Guard for Microsoft Edge is Microsoft’s latest attempt to improve the security of its browser and respectively Windows 10. The new addition will run Edge in a lightweight virtual machine. Shortly said, the application is powered by…

CYBER NEWS
giphy

Trump Hotel Chain Exposes 70,000 Credit Card Numbers

Trump Hotel Collection, the hotel chain of Republican presidential candidate Donald Trump, has apparently exposed personal information of customers in hacks. Over 70,000 credit card numbers and other PII details have been leaked. The hotel chain has agreed to pay…

CYBER NEWS
shutterstock_482126278

2016 and Beyond, Where Is Bitcoin Headed?

A judge recently ruled that Bitcoin is a means of payment and therefore it qualifies as money: Bitcoins are funds within the plain meaning of that term. Bitcoins can be accepted as a payment for goods and services or bought…

CYBER NEWS
twitter-biannual-transparency-report-2016

Twitter Transparency Report 2016: 5,676 Government Information Requests Received

Have you heard of Twitter’s biannual transparency report that analyzes the legal requests received in regards to user information? Well, the second biannual report for 2016 is already a fact and it definitely should be read carefully. I haven’t read…

CYBER NEWS
trojan

RAUM Tool: Torrents Dropping Malware and Ransomware

If you download torrents, this news definitely concerns you. InfoArmor researchers have just disclosed Raum – a tool employed by Eastern European organized cybercrime group Black Team to spread malware via malicious torrents. The malware currently distributed in the campaign…

CYBER NEWS
dna-computer-microsoft-stforum

Microsoft Builds a DNA Computer, Says Cancer Is a Computational Problem

Cancer is the physiological threat of the 21st century. However, technology may turn out to be the key for solving the deadly case of cancer. Microsoft has recently promised to “solve the problem of cancer” by using ground-breaking computer science…

CYBER NEWS
peekasso-mr-robot-gif

Mr. Robot Reality Hacks: A Philosophical Viewpoint

Mr. Robot is beginning to feel a lot more like a philosophical essay on life rather than a hacking TV show, with Satie’s Gnossienne played in the background. It is perhaps not a coincidence that I have been reading Sci-Fi…

CYBER NEWS
SensorsTechForum-Bitcoin

Bitcoin Cryptocurrency Qualifies as Means of Payment, a.k.a. Money

Does Bitcoin have the value of (physical) money? This question hangs around us as Bitcoin is becoming more popular and profitable. With the reshaping and readjustment of cybercrime, the cryptocurrency has turned into the means of profit for malware coders,…

CYBER NEWS
bec-scams-2016-stforum

BEC Scams: Emails That Bankrupt Businesses

According to the FBI, a BEC scam, or a Business Email Compromise scam, is a sophisticated online fraud that targets businesses working with foreign suppliers and regularly performing wire transfer payments. Also known as a Man-in-the-Email scam, BEC has turned…

CYBER NEWS
exploit-kit-malware-user-stforum

Top 3 Vulnerabilities Used in 2016 Exploit Kit Attacks

A new research conducted by Digital Shadows reveals that 76 vulnerabilities are being exploited in exploit kit attacks. 27 of them are found in Flash. Despite the popularity of Flash flaws, an IE bug prevails in most attack scenarios and…

CYBER NEWS
Mr-Robot-whiterose-culturageek.com_.ar_

Mr. Robot Season 2 Hacks and Exploits: CrackSIM and Crack Theories!

Have you been impatiently looking forward to Mr. Robot’s second season? Do you always have questions about the hacks that take place during the show? Are you often pausing to have a closer look at what’s written on that PC…

THREAT REMOVAL
STF-dns-unlocker-2016-adware-ads-main-site-page

Why Can’t I Remove DNS Unlocker?

DNS Unlocker has been around for a few years now, and still continues to be one of the most persistent adware pieces in the wild. In 2017, catching an intrusive and persistent potentially unwanted program like DNS Unlocker continues to…

CYBER NEWS
malware-attack-sensorstechforum

CSRF Flaw in Yandex Browser Could Lead to Personal Data Theft

Many services we use on a daily basis turn out to be quite buggy. This time our attention was caught by a vulnerability in the Yandex Browser, built on Chromium, which could have allowed attackers to steal users’ browsing history,…

CYBER NEWS
mirrorlink

Cars Connected to Smartphones Prone to Hacks, Research on MirrorLink Says

MirrorLink by Connected Car Consortium is the first industry standard for connecting smartphones to in-vehicle infotainment systems (IVI). A recent comprehensive research, titled ‘A Security Analysis of an In Vehicle Infotainment and App Platform’ and carried out by Damon McCoy,…

CYBER NEWS
p17_0000

Why Did I Click on That Phishing Link? Why, Indeed?

Have you ever clicked on a random link in your inbox or in a Facebook message? Despite knowing the risks? Well, you are not alone! A study by researchers at Friedrich-Alexander University (FAU) of Erlangen-Nuremberg, Germany, discovered that people still…

THREAT REMOVAL
decrypt-ransomware-stforum

.cerber3 Virus Files: Can I Restore Them?

Cerber3 ransomware virus is already a fact, as accountable by several tweets by security researchers. The crypto virus is most likely appending the .cerber3 extension to victims’ encrypted files. The ransom note is titled # HELP DECRYPT #.txt. Not too…

CYBER NEWS
have-i-been-pwned-twitter-stforum

71,000 Minecraft World Map Accounts Breached, Troy Hunt Says

Troy Hunt, owner of HaveIBeenPwned, just reported that 71,000 user accounts and IP addresses have been leaked from a Minecraft fan website (minecraftworldmap(.)com). The dumps include email addresses, IP addresses, usernames and passwords associated with that site. The leaked passwords…

CYBER NEWS
remote-access-trojan-sensorstechforum

Ozone RAT Spread in Massive Spam Campaign

A new spam campaign delivering the Ozone RAT has been detected targeting German-speaking users. The attack is spread via malicious Office documents. However, instead of the well-known macro malware, the operation ends with the installation of Ozone. Interestingly, users are…

CYBER NEWS
vulnerability-stforum

Bug in Google Login Pages Can Cause Malware Download

Imagine there is a currently exploitable bug in Google. Well, truth is you don’t need to imagine it because it is already there! British security researcher Aidan Woods just disclosed an issue found on Google’s login page. This issue enables…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree