Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 185

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS
windows-update-troubleshooter-stforum

How to Troubleshoot Problems with Windows Update and More

No matter how irritating Windows updates may be, they should not be neglected. Neglect them, and who knows what form of advanced malware will strike your system. Unfortunately, in some cases our good will is not enough and Windows Update…

CYBER NEWS
keep-calm

Do You Need Antivirus Software on Android, iOS and Windows Phone?

Having an active anti-malware/ antivirus protection on your desktop computer is a must. However, with the rise of mobile devices, comes a logical question. Shouldn’t we be worried about the safety of our mobile devices just as much? Not to…

CYBER NEWS
tor-browser-busted-user-fingerprinting

Tor Browser Users Fingerprinting: Mission Possible

For many users, Tor is the online version of a scapegoat, as it is religiously used to hide one’s sins. In other words, Tor (an acronym for The Onion Router, the project’s original name) is widely accepted as anonymous and…

CYBER NEWS
patch-tuesday-sad-face-stforum

From KB 3142015 to KB 3141780: MS Security Bulletin, March 2016

Patch Tuesday for March 2016 is already a fact. Microsoft has just released 13 security bulletins, aimed at a total of 44 vulnerabilities. 5 of the updates are critical and are addressing remote code execution issues in Windows (such as…

CYBER NEWS
shutterstock-malware

97% of Malware Infections Are Polymorphic, Researchers Say

2015 has been a cornerstone in cybersecurity. And all the reports released by security vendors prove it. From ransomware and banking botnets, through targeted attacks and massive data breaches, to “average” social engineering and spam campaigns, malware researchers have seen…

THREAT REMOVAL
keranger-ransomware-transmission

Remove Ransomware.OSX.KeRanger from Mac Computers

In case you haven’t heard – the very first ransomware to successfully attack Mac has already surfaced the Web, spreading via the hacked Transmission BitTorrent client for Mac. The ransomware, dubbed KeRanger (Ransomware.OSX.KeRanger), has been identified as the very first…

THREAT REMOVAL
ransomware-file-encryption

Cerber: Ransomware-as-a-Service Now Has a Voice

We have already seen malware that speaks (literally). Fake tech support scam pages often implement voice-over messages. And it is easy to assume why. You would definitely feel panicked if your computer started repeating that all your personal information was…

CYBER NEWS
south-park-truth-and-advertising-stforum

Truth and Advertising IRL: Stop Targeted Ads from Following You

Ads following you around much like a stalker in flesh and blood are not just featured in the iconic South Park episode Truth and Advertising, but part of the online reality we live in. Interest-based, or targeted, advertising is here…

CYBER NEWS

The DROWN Attack, or How to Intercept HTTPS Communications

Just when things got quiet around the infamous Heartbleed bug, a new vulnerability comes around and bites us. The question surely is how hurtful the bite is. Well, quite a lot. According to security researchers, DROWN, the new vulnerability in…

CYBER NEWS
banking-malware-stforum

ATMZombie Hits Hard Israeli Banks, Uses Proxy-Changing Techniques

A curious fact – Israeli banks haven’t been targeted by banking malware. Until now. Kaspersky researchers have recently discovered the very first banking Trojan doing just that, targeting Israeli banks. The Trojan has been dubbed ATMZombie. ATMZombie applies the well-known…

CYBER NEWS
ransomware-message-CTB-Locker-stforum-kaspersky-lab

New CTB-Locker Variant Targets Vulnerable Web Servers

Ransomware, just like any other cyber threat, is constantly evolving and adding new features to its set of capabilities. Ransomware affiliate programs are also a big factor, as any wannabe cyber criminal with basic skills can now join and make…

CYBER NEWS
banking-botnets-2015-stforum

Banking Botnets 2015: Multiple Attack Scenarios, More Features

Banking malware has been evolving and transforming into one of the greatest threats on the malware scene, despite the international, collaborative efforts on behalf of law enforcement and cyber crime experts. A new report released by Dell Secure Works Counter…

THREAT REMOVAL
ransomware-virus

Ransomware Hits 3 German Hospitals, the Nightmare Continues

Unfortunately and quite alarmingly, malware and ransomware attacks on hospitals and healthcare organizations are happening every other day. The attack on the Hollywood Presbyterian Medical Center will not be the last one. Three German hospitals have been hit by ransomware,…

CYBER NEWS
lewis-rhodes-labs-cyber-microscope

LRL Cyber Microscope Shapes the Future of Cyber Defense

Cyber microscope may sound like something from the future but it is indeed reality. It is a tool developed and introduced by Lewis Rhodes Labs. Essentially, LRL Cyber Microscope provides advanced security anomaly detection, and is a quite interesting piece…

CYBER NEWS
Play-Store

Porn Clicker Trojan Hides in Google Play Apps, Check Your Android

Malware creators often use porn applications to spread malicious code across users’ mobile and desktop devices. Often, Google Play is also included in such scenarios, in which click-jacking mobile malware is used to make quick income for affiliates. The operating…

CYBER NEWS
google-project-shield-stforum

Google Launches Project Shield to Protect Small Portals from DDoS

Have you heard of Google’s Project Shield? It is a project developed by the search engine giant with the idea to protect smaller organizations, such as human rights websites, from DDoS (distributed denial-of-service) attacks. From Google.com: Project Shield uses technology…

CYBER NEWS
shutterstock_223094779

Two-Factor Authentication Not Safe, Research Proves it

Have you heard of two-factor authentication? Also known as 2FA or 2-step verification, it is a technology that has been around for quite some time. Patented in 1984, 2FA provides identification of users based on the combination of two different…

CYBER NEWS
privacy-policy-data-collection-stforum

83% of Brits Admit to Never Reading Privacy Policies

An intriguing research has been just completed by online privacy company Vest. The research, performed among UK users, was commissioned to determine the levels of trust people have when it comes to platforms such as Microsoft, Apple, Google, and Facebook.…

CYBER NEWS
shutterstock-malware

Attack Involves Silverlight Exploit CVE-2016-0034, Angler EK, and TeslaCrypt

Microsoft Silverlight vulnerabilities have already begun transforming into the next big issue in cyber security. Even though they haven’t been used in many attacks, Silverlight flaws have the potential to be quite damaging. Having said that, attacks based on a…

CYBER NEWS
baidu-browser-flaws-sensorstechforum

Baidu Browser Acts Much Like an Infostealer in Android and Windows

Baidu, the browser and web services company that is quite like the Chinese Google, has just been involved in a privacy scandal. According to security researchers, the Baidu browser for both Windows and Android acts like an infostealer, collecting information…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree