Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 193

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS
LINUX-linux-encoder-1-ransomware

Webmasters, Beware of Linux.Encoder.1 Ransomware!

Linux is not only targeted by DDoS attackers but also by ransomware writers. Linux is now endangered by a threat registered as Linux.Encoder.1, first spotted by Dr. Web’s security researchers. Linux.Encoder.1 targets Linux-powered websites and servers by encrypting MySQL, Apache…

THREAT REMOVAL
Top3-Ransomware-Families-2015-CTB

Top 3 Ransomware Families of 2015. CTB-Locker

Our 3-part article series continues with a detailed description and analysis of CTB-Locker. Jump to the first part dedicated to CryptoWall – the biggest ransomware family of 2015. CTB-Locker/ Critroni Ransomware Background Check Security researchers have observed thousands of cases…

THREAT REMOVAL
cryptowall-4 0 -sensorstechforum

CryptoWall 4.0 – Let the Mockery Begin

Cryptowall 4.0 or a CryptoWall point release, it has definitely caught both victims and researchers by surprise. While security researchers are analyzing malware data compiled throughout 2015, the hacking team behind CryptoWall has released its latest version. The news of…

CYBER NEWS
hackers

Teen Hackers Leaked Info on 3,500 US Government Employees

Remember the hack on John Brennan’s AOL account? A group of teenagers claimed to be behind the CIA’s director infamous data breach. As it seems, the teen hacktivist group known as Crackas with Attitude isn’t done yet as it may…

CYBER NEWS
p15_0000

Linux-based, DDoS Botnets Prevail in Q3 2015

DDoS, or a distributed denial-of-service attack, is one of the most common ways to conceal serious intrusions, extort enterprises or sabotage competitors. We’ve seen many DDoS attacks take place in 2015, and reports have already been released emphasizing on the…

CYBER NEWS
windows10-alt

Microsoft Admits to Windows 10 Core Data Collection

Microsoft keeps on changing things and making them a little bit harder for non-tech-savvy users with every day. In fact, the limits of your knowledge (or reason, for the matter) may not be nearly enough to get on the horse…

CYBER NEWS
terrymyerson1

Microsoft’s Master Plan: Windows 10 on 1 Billion Devices

Windows 10 may have been much anticipated among the core followers of the operating system. However, the events that took place after the official release of Win10 definitely triggered discontent. Events… or to be more precise – updates. The update…

CYBER NEWS
attention-updates-windows-loading

KB 3105210 – Yet Another Ghost Update for Windows

Microsoft has already released about а dozen cumulative updates. At least that’s what appears if one decides to count down the released patches to this date. However, the amount of released patches may not be as crystal as one would…

CYBER NEWS
2015-mac-malware-report

OS X Malware Peaks in 2015. Is My Mac Safe?

There’s a belief that Mac users are not susceptible to malicious software. Well, there WAS a belief… A vast research on Mac malware reveals that 2015 has been the worst so far in terms of security. The brand new report…

CYBER NEWS
hackingteam-new-release-anti-encryption

Hacking Team Pitches Anti-Encryption, Galileo Tools to the FBI

If you’re in the IT security world, you most definitely have heard enough about the Italian company Hacking Team. Not only you could have heard about Hacking Team’s recent hack-and-leak, but you may have been their victim as well. Hacking…

THREAT REMOVAL
ransomware-file-encryption

Chimera Ransomware Variant Frightens to Publish Victims’ Files

We’re all familiar with the Chimera ransomware and its infection methods. However, researchers have detected a new variant of the file encrypting threat that does more than just hold users’ files hostage. The latest Chimera ransomware combines scareware techniques with…

THREAT REMOVAL
Top3-Ransomware-Families-2015-Cryptowall

Top 3 Ransomware Families of 2015. CryptoWall

In a series of three articles, we will analyze the features of the ransomware families of Cryptowall, CryptoLocker and TorrentLocker. The three families have proven to be the most notorious ones, generating large amounts of money and affecting thousands of…

THREAT REMOVAL
cryptowall-CTA-report

CryptoWall 3.0: $325m Income, 406,887 Infections, 1 Hacking Team

Ransomware is persistently making the headlines, and leaves no time for security researchers (like ourselves) to take a breath.Cryptowall 3.0, in particular, has been a real source of inspiration for experts, trying to break its encryption. However, Cryptowall 3.0 is…

THREAT REMOVAL
noransom-kaspersky-bitcryptor-coinvault-closed

No Ransom! 14,031 Decryption Keys for CoinVault, BitCryptor Released

It’s good to know that there are security professionals who are constantly seeking ways to fight back ransomware. The file encrypting monster has affected millions of people worldwide. Fortunately, researchers at Kaspersky Lab haven’t stopped working on ransomware solutions. They…

CYBER NEWS
Android-malware

Taomike SDK Library Spies on SMS in 18,000 Android Apps

The simple truth is that we’re being monitored 24/7, whether we like it or not. If you’re on the Internet, you’re not anonymous anymore. If you’re running a third party Android application, you may have suffered private messages theft. At…

CYBER NEWS
000webhost.com-page

000Webhost Security Breach:13,5 Million Passwords Leaked

One of the biggest free web hosting companies out there – 000Webhost – has been compromised and has suffered a gigantic data breach. The personal records of at least 13.5 million of its users have been exposed. Compromised data consists…

THREAT REMOVAL
mobile malware-infographic-blue-coat

Mobile Malware 2015: Ransomware, Tor and Porn Apps

The end of the year is near, and it’s time for some (scary) annual reports on cybercrime. Let’s see what the numbers are showing in terms of mobile security. As it turns out, mobile ransomware has turned into the most…

CYBER NEWS
whatsapp

WhatsApp FunXMPP Protocol Analyzed, PII Stored on Servers

Privacy of personal information is slowly becoming a myth. We know enough about the data collection policies of a bunch of global companies and various service providers. The truth is we can easily be identified remotely – by both legitimate…

CYBER NEWS
trojan

Duuzer, Brambul and Joanap Triple Attack Hits South Korea

Researchers at Symantec have just unveiled yet another sophisticated backdoor, currently targeting South Korean organizations. The threat seeks to obtain full control over the infected systems and can execute a number of malicious operations. Researches have named the backdoor Duuzer…

THREAT REMOVAL
ransomware-file-encryption

FBI: Pay the Bitcoins, Ransomware is That Good

One of the tips on duty when dealing with a ransomware attack is not paying the amount, prevalently demanded in bitcoins. This tip has been around ever since ransomware attacks reached a peak in recent years. Malware researchers usually advise…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree