Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 199

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS
cyber-police-ransomware-blue-coat-stf

Cyber.Police Android Ransomware Spread Without User Interaction

Image Source: Blue Coat Researchers at Blue Coat have discovered and analyzed a new mobile ransomware campaign that targets older Android devices and doesn’t require user interaction prior to infection. The campaign may be novel but the ransomware has been…

CYBER NEWS
beautiful-people-data-breach-stforum

BeautifulPeople(.)com Dating Site In a Major Data Breach Scandal

Remember the Ashley Madison hack from 2015? On 18 and 20 August, a hacking group called The Impact Team leaked more than 25 gigabytes of company data, user details included. Data breaches of that scale happen quite often and put…

CYBER NEWS
just-google-it-stforum

Ask Google: Is Your Googling As Good As It Could Be?

The search capabilities of the Big G are a lot more flexible and powerful than you may think. Just imagine how much more you could derive from Google, if you were aware of all the tips and tricks on improving…

THREAT REMOVAL
petya-ransomware-skull-art-acsii-master-boot-record-dropbox-unique

Remove Booyah Ransomware, CRIPTOSO.KEY

Security researchers analyze new ransomware pieces on a daily basis. The ransomware business is definitely thriving, one of its latest additions being the so-called Booyah ransomware. The name of the threat derives from its executable, booyah.exe. The ransom message comes…

CYBER NEWS
banking-malware-stforum

Panda Banker Distributed via Macros in Word Documents and EKs

Banking malware has evolved a lot during the last couple of years. New banking malware pieces keep on emerging, targeting banks all over the globe. The latest threat of the kind has been identified by researchers at Proofpoint and Fox…

THREAT REMOVAL
ransomware-virus

Remove TeslaCrypt 4.1b and Restore Your Files

Well-known and widely feared ransomware pieces such as TeslaCrypt and CryptoWall are constantly being improved and as a result, new versions are released. According to Bleeping Computer, TeslaCrypt 4.1b has just surfaced the Web, as a user has submitted a…

CYBER NEWS

RansomWhere? Offers Free Protection Against OS X Ransomware

Ransomware is the most vicious cyber threat currently affecting thousands of users on a global level. Mostly affected are users of Windows, being targeted by both sophisticated and simplistic ransomware pieces. However, OS X and Linux users are not spared…

CYBER NEWS
pexels-photo

Angler EK Now Distributes CryptXXX Ransomware and Bedep Malware

Image Source: Pexels.com Cyber criminals are constantly reinventing well-established methods to attack unsuspecting users. One of the most common attack paths is through compromised websites. Once the user has landed on such a website, he will then encounter an exploit…

CYBER NEWS
end-to-end-encryption-whatsapp

End-to-End Encryption, WhatsApp and the Next Big Thing in Cyber Security

No matter if you are an Apple fan or not, you have definitely heard or read about the dispute between FBI and Apple. Moreover, this dispute has triggered a strong wave of discussions about encryption in general, specifically end-to-end encryption.…

CYBER NEWS
image-captcha-facebook-blackhat-stforum

Facebook’s and Google’s CAPTCHAs Defeated!

CAPTHAs, or Completely Automated Public Turing test to tell Computers and Humans Apart, can be pretty annoying sometimes, but, in terms of online security, they are a necessary evil. Unfortunately, Google’s and Facebook’s CAPTCHA services have been broken down by…

CYBER NEWS
pexels-photo-67112

Let’s Google Google! Not so Popular Facts about The Search Engine

Image Source: Pexels.com Can you imagine your life without Google? Perhaps you can, perhaps you can’t. And perhaps it depends on whether you were born before or after Google was introduced to the world. Nonetheless, the truth is we use…

REVIEWS
maxresdefault

MacX HD Video Converter Pro for Windows Software Review

MacX HD Video Converter Pro for Windows (version 5.9.4) is an advanced tool for video conversion with an intuitive interface and great ease of use. A version for Mac users is also available. In both of its versions, MacX HD…

CYBER NEWS
password-brute-force-stforum

Brute Force Attacks – a Threat to Encryption

What Is a Brute Force Attack? Brute force attacks may sound like something very complicated but they are easy to explain and understand. However, the protection against them is not as easy to achieve. In the language of cyber security,…

REVIEWS
doclock-logo-sensorstechforum

docLock v. 2.1.1.1 Software Review

Personal security is a big issue, and it’s good that we have software products that will make us feel safer. docLock by Large Software is such a program. As visible by the program’s name, docLock’s primary purpose is to protect…

THREAT REMOVAL
ransomware-file-encryption

SamSam Ransomware: Encryption, Payment and Prevention

We won’t be exaggerating if we say that every day we wake up to a new ransomware piece just detected in the wild. Unfortunately, every new ransom is worse than its predecessor – more malicious, sophisticated and damaging. To make…

REVIEWS
bitdefender-antiransomware-protection-enabled-stforum

Bitdefender Anti-Ransomware Software Review

Bitdefender Anti-Ransomware toolkit was just updated and now offers protection against the latest versions of CTB-Locker, Locky and TeslaCrypt. The toolkit, initially created few years ago against CryptoWall and CryptoLocker, should be considered by as many users as possible, since…

REVIEWS
revo-uninstaller-stforum

Revo Uninstaller Pro Software Review

Revo Uninstaller Pro is a perfect program for Windows users who have many programs and find it challenging to uninstall apps through Programs and Features -> Uninstall a Program. The program is perfect for users who wish to completely uninstall…

CYBER NEWS
pexels-photo-51415

Advanced Persistent Bots Can Mimic Human Behavior

We know about advanced persistent threats. But what do we know about advanced persistent bots? Advanced Persistent Bots – The New Emerging Threat According to the latest annual report by Distil Networks, the number of bad bots has increased sensibly…

REVIEWS
secunia-loading-stforum

Flexera (Secunia) Personal Software Inspector Review

Have you heard of personal software inspector? It’s a type of program that identifies vulnerabilities in the applications on your computer. Flexera Personal Software Inspector, also known as Secunia Personal Software Inspector, is a free program that will detect outdated…

CYBER NEWS
apple-imac-ipad-workplace-38568

Apple’s Zero-Day Bypasses System Integrity Protection in iOS and OS X

A zero-day flaw in Apple’s OS X may sound like something rather impossible. Unfortunately, researchers have indeed discovered a zero-day vulnerability that enables attackers to exploit key protection feature in the believed-to-be invincible operating system. As revealed by SentinelOne researcher…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree