Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 193

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS
south-park-truth-and-advertising-stforum

Truth and Advertising IRL: Stop Targeted Ads from Following You

Ads following you around much like a stalker in flesh and blood are not just featured in the iconic South Park episode Truth and Advertising, but part of the online reality we live in. Interest-based, or targeted, advertising is here…

CYBER NEWS

The DROWN Attack, or How to Intercept HTTPS Communications

Just when things got quiet around the infamous Heartbleed bug, a new vulnerability comes around and bites us. The question surely is how hurtful the bite is. Well, quite a lot. According to security researchers, DROWN, the new vulnerability in…

CYBER NEWS
banking-malware-stforum

ATMZombie Hits Hard Israeli Banks, Uses Proxy-Changing Techniques

A curious fact – Israeli banks haven’t been targeted by banking malware. Until now. Kaspersky researchers have recently discovered the very first banking Trojan doing just that, targeting Israeli banks. The Trojan has been dubbed ATMZombie. ATMZombie applies the well-known…

CYBER NEWS
ransomware-message-CTB-Locker-stforum-kaspersky-lab

New CTB-Locker Variant Targets Vulnerable Web Servers

Ransomware, just like any other cyber threat, is constantly evolving and adding new features to its set of capabilities. Ransomware affiliate programs are also a big factor, as any wannabe cyber criminal with basic skills can now join and make…

CYBER NEWS
banking-botnets-2015-stforum

Banking Botnets 2015: Multiple Attack Scenarios, More Features

Banking malware has been evolving and transforming into one of the greatest threats on the malware scene, despite the international, collaborative efforts on behalf of law enforcement and cyber crime experts. A new report released by Dell Secure Works Counter…

THREAT REMOVAL
ransomware-virus

Ransomware Hits 3 German Hospitals, the Nightmare Continues

Unfortunately and quite alarmingly, malware and ransomware attacks on hospitals and healthcare organizations are happening every other day. The attack on the Hollywood Presbyterian Medical Center will not be the last one. Three German hospitals have been hit by ransomware,…

CYBER NEWS
lewis-rhodes-labs-cyber-microscope

LRL Cyber Microscope Shapes the Future of Cyber Defense

Cyber microscope may sound like something from the future but it is indeed reality. It is a tool developed and introduced by Lewis Rhodes Labs. Essentially, LRL Cyber Microscope provides advanced security anomaly detection, and is a quite interesting piece…

CYBER NEWS
Play-Store

Porn Clicker Trojan Hides in Google Play Apps, Check Your Android

Malware creators often use porn applications to spread malicious code across users’ mobile and desktop devices. Often, Google Play is also included in such scenarios, in which click-jacking mobile malware is used to make quick income for affiliates. The operating…

CYBER NEWS
google-project-shield-stforum

Google Launches Project Shield to Protect Small Portals from DDoS

Have you heard of Google’s Project Shield? It is a project developed by the search engine giant with the idea to protect smaller organizations, such as human rights websites, from DDoS (distributed denial-of-service) attacks. From Google.com: Project Shield uses technology…

CYBER NEWS
shutterstock_223094779

Two-Factor Authentication Not Safe, Research Proves it

Have you heard of two-factor authentication? Also known as 2FA or 2-step verification, it is a technology that has been around for quite some time. Patented in 1984, 2FA provides identification of users based on the combination of two different…

CYBER NEWS
privacy-policy-data-collection-stforum

83% of Brits Admit to Never Reading Privacy Policies

An intriguing research has been just completed by online privacy company Vest. The research, performed among UK users, was commissioned to determine the levels of trust people have when it comes to platforms such as Microsoft, Apple, Google, and Facebook.…

CYBER NEWS
shutterstock-malware

Attack Involves Silverlight Exploit CVE-2016-0034, Angler EK, and TeslaCrypt

Microsoft Silverlight vulnerabilities have already begun transforming into the next big issue in cyber security. Even though they haven’t been used in many attacks, Silverlight flaws have the potential to be quite damaging. Having said that, attacks based on a…

CYBER NEWS
baidu-browser-flaws-sensorstechforum

Baidu Browser Acts Much Like an Infostealer in Android and Windows

Baidu, the browser and web services company that is quite like the Chinese Google, has just been involved in a privacy scandal. According to security researchers, the Baidu browser for both Windows and Android acts like an infostealer, collecting information…

CYBER NEWS
public-wifi-dangers-sensorstechforum

Avast Mobile Experiment Proves Why Open WiFi Is Dangerous

When you have your mobile phone with you but don’t want to use your data, what do you usually do? You search for a free and open WiFi connection, and if such is located, you don’t think twice and just…

CYBER NEWS
Trojan-Horse

Acecard, Android Trojan and Phishing Tool Targets Over 30 Banks

In terms of mobile malware, Android has been a primary target, attacked by various types of malicious software. From adware, to Trojans and ransomware, Android users should be extra cautious and should think about the protection of their devices, especially…

THREAT REMOVAL
shutterstock_94715374

Locky, Dridex Botnet Has Also Delivered TeslaCrypt

Locky ransomware is the latest devastating member of the ransomware family that employs strong encryption and is used in targeted campaigns. For example, the Hollywood Presbyterian Medical Center was indeed attacked by Locky, as disclosed by security researchers. Thanks to…

CYBER NEWS
ninja-meme-lol-meme-private-browsing-stforum

Incognito Mode Busted: 4 Myths about Private Browsing

Private browsing is one of the easy options to sustain some level of online confidentiality. Unfortunately, private browsing is not enough if you truly wish to remain ‘unseen’. In other words, there are several basic myths that surround private browsing…

THREAT REMOVAL
17-thousand-dollar-ransom-sensorstechforum

$17,000 Ransom Paid by Hollywood Medical Center (Updated)

If you follow IT security news, you most definitely have heard that the Hollywood Presbyterian Medical Center was hit by ransomware. Consequently, the Center decided to pay the ransom, realizing that they had no choice. However, the claim that the…

CYBER NEWS
microsoft-surface-stforum

Windows 10 Helps Microsoft’s Surface Outrun Apple’s iPad

The battle between Apple and Microsoft is more bloodthirsty than ever. Even though it appears that there are enough fans on both sides, Apple is probably not too happy that Microsoft’s devices are becoming more and more popular amongt businesses……

THREAT REMOVAL
zerolocker-encrypted-extension-ransomware-stforum

Can ‘.encrypted Virus’ Files Be Restored?

There are several ransomware pieces that append an ‘.encrypted’ extension to the victim’s filenames. Thus, such ransomware are often referred to as ‘.encrypted viruses’. One such threat is ZeroLocker that has been known to security researchers since 2014. Another ransomware…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree