Home > Berta Bilbao

Author Archive: Berta Bilbao - Page 100

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

REVIEWS
13 TIRANIUM_ANTIVIRUS_2014_TEST_2

Is Your Antivirus to be trusted? / To Trust or Not to Trust Your Antivirus

Earlier this year the malware researcher Neil J. Rubenking published a review concerning Tiranium Premium Security 2014. After the review was published, he got a message from a user claiming that Tiranium abused different online websites associated with malware checks…

CYBER NEWS
browser-disabled

Android Browser with a Flow Attacking User’s Privacy

What Is the Android Browser Security Bug Android Security Bug has been found by the independent security researcher Rafay Baloch and is affecting 50 % of the Android users. The security bug has been found in the Android Browser app,…

CYBER NEWS
kindle-bug

Malicious Kindle Ebooks Help Hackers Access Amazon Accounts

The feud between book lovers about paper and electronic devices is constantly growing. If you are among the ones preferring to enjoy their read on a mobile device, you should be a bit more careful. Kindle Ebooks Injected with Malicious…

CYBER NEWS
malicious-email

Giveaways of a Malicious Email

Warning! This Email Is Malicious! Nowadays emails get proper spam filtering. Not long ago it was a lot easier for spam email to end up in your inbox. Luckily this is history now, especially if you use Gmail. Keep in…

HOW TO
Unknown-File

File Extension UNKNOWN – How to Open It?

Each file has an extension, but every now and then you may come across a file in an UNKNOWN format. In such cases, it is a real challenge to identify the type of the file and find an application to…

CYBER NEWS
Apple-Two-Factor-Verification

Apple’s iCloud with Two Factor Authentication

Shortly after the scandal with the nude celebrity pictures that leaked online, Apple has activated a 2FA (two-factor authentication) for iCloud. In the 2FA process user has to enter additionally a second passcode, which is dynamically generated and consists of…

HOW TO
browser-update

How to Update Your Browser

For the majority of the Internet users, the browser is their connection to the rest of the Web. It is used to navigate to various webpages, allows users to follow links, and helps them explore basically everything the Web has…

HOW TO
USB-device

What to Do When Your USB Device Doesn’t Work?

Here are a few tips what to do, if you are wondering what could possibly be wrong with your computer when you cannot get your USB device to work. Something is obviously broken, but you have no idea if it…

HOW TO

How to use Microsoft Office on Tablets and Smartphones?

Many critics question Microsoft’s lack of a decent platform for its MS Office suite on iPad tablets and different smartphones. Actually, Microsoft has numerous options of MS Office suitable for cell phones. They are just not completely featured versions of…

CYBER NEWS
Zemot-Malware

Zemot Malware: Delivered with Exploit Kits and Asprox Botnet

What Is Zemot? Zemot Dropper is a type of malware downloader. It is part of a complex network, which includes different malware types. Different variants of Zemot can be distributed with other malware as one dropper can spread many malicious…

THREAT REMOVAL
synolocker-ransomware

Synology NAS Devices Attacked by Synolocker Ransomware

What Is SynoLocker and How Does It Work? SynoLocker is a file encrypting ransomware that targets Synology NAS (Network Attached Storage) devices. What this particular piece of ransomware does is to exploit vulnerabilities in the DSM operating system. It targets…

CYBER NEWS
phishing-scheme

A Twitter Phishing Campaign Is After User’s Credentials

A campaign run on Twitter tries to lure users into landing on a phishing page which only goal is to get users’ credentials. It seems that either compromised Twitter accounts or bots are used to deliver a spam message with…

CYBER NEWS
Chrome-Web-Store

Malicious Apps Still End Up in Chrome Web Store

For some time now, Google has been trying to limit the security issues related to the numerous applications that get installed on Google Chrome along with the installation of various unverified extensions. It is mandatory for apps and extensions that…

CYBER NEWS
NFC

What Users Need to Know About Near Field Communication (NFC)

Computer technology experts say that NFC is the next big thing that will be applied by the new mobile phones that are presented on the market. Though new to the users and yet to be adopted by the masses, the…

THREAT REMOVAL
TorrentLocker-Ransomware-Message

Finnish Experts Crack TorrentLocker Ransomware

Finnish researchers Antti Nuopponen, Patrik Nisén and Taneli Kaivola of Finnish consultancy Nixu discovered how to decrypt the files that have been encrypted by the recently spread TorrentLocker ransomware without paying the required fee. All the user needs is the…

CYBER NEWS
Apple-Pay-Security-Issues

Will Your Money Be Safe with Apple Pay?

The details on the new upcoming iPhone 6 and Apple Watch were announced yesterday. Both devices will be equipped with Apple’s new contactless mobile payment system – Apple Pay. Apple Pay enables phone payments at points-of-sale without sharing credit card…

CYBER NEWS
salesforce-credentials-targeted-by-Dyre-malware

Dyre Malware Focuses on Salesforce Credentials

Dyre, also known as Dyreza and Dyranges by Symantec, is a malware notorious for pursuing banking credentials. Dyre is focused mainly on the customers of Bank of America and Citibank, RBS and Natwest in the UK, and Ulster Bank in…

CYBER NEWS
Facebook-Scam-Small-Humanoids

New Facebook Scam – Small Humanoids Discovered in the US

A message on Facebook that appears to be from a person in the user’s friend list, invites people to click on a link that is supposed to show a video of two little human-like creatures. Many users trust the link…

HOW TO
icloud-backup-safety

How to Keep Your Data Safe on Apple’s iCloud

After the naked pictures of several celebrities have leaked online recently, and the Kelihos botnet phishing campaign managed to take advantage of the users’ worries spamming them with fake emails and thus collecting their Apple IDs, the issue with the…

CYBER NEWS
passwords-leak

5 Million Gmail Account Credentials Leaked Online

Earlier this morning, unknown cyber criminals have leaked over 5 million Gmail usernames and passwords on the Internet. The database containing the credentials appeared on a Russian Bitcoin forum. All the passwords are presented in a .txt file. How the…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree