Home > Berta Bilbao

Author Archive: Berta Bilbao - Page 101

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

CYBER NEWS
Apple-Pay-Security-Issues

Will Your Money Be Safe with Apple Pay?

The details on the new upcoming iPhone 6 and Apple Watch were announced yesterday. Both devices will be equipped with Apple’s new contactless mobile payment system – Apple Pay. Apple Pay enables phone payments at points-of-sale without sharing credit card…

CYBER NEWS
salesforce-credentials-targeted-by-Dyre-malware

Dyre Malware Focuses on Salesforce Credentials

Dyre, also known as Dyreza and Dyranges by Symantec, is a malware notorious for pursuing banking credentials. Dyre is focused mainly on the customers of Bank of America and Citibank, RBS and Natwest in the UK, and Ulster Bank in…

CYBER NEWS
Facebook-Scam-Small-Humanoids

New Facebook Scam – Small Humanoids Discovered in the US

A message on Facebook that appears to be from a person in the user’s friend list, invites people to click on a link that is supposed to show a video of two little human-like creatures. Many users trust the link…

HOW TO
icloud-backup-safety

How to Keep Your Data Safe on Apple’s iCloud

After the naked pictures of several celebrities have leaked online recently, and the Kelihos botnet phishing campaign managed to take advantage of the users’ worries spamming them with fake emails and thus collecting their Apple IDs, the issue with the…

CYBER NEWS
passwords-leak

5 Million Gmail Account Credentials Leaked Online

Earlier this morning, unknown cyber criminals have leaked over 5 million Gmail usernames and passwords on the Internet. The database containing the credentials appeared on a Russian Bitcoin forum. All the passwords are presented in a .txt file. How the…

CYBER NEWS
phishing-campaigns

Kelihos Botnet Phishing Campaign Collects Apple IDs Using Spam Emails

Shortly after the iCloud accounts of numerous celebrities have been compromised, the cyber crooks behind the Kelihos botnet started a new phishing campaign, targeting the owners of Apple online accounts. Russian IP Used for the Alleged Purchase The Symantec Research…

CYBER NEWS

Kyle and Stan Malvertising Network – A New Threat for Windows and Mac Users

Kyle and Stan – A brand new malvertising network has been affecting Windows and Mac users who visit popular webpages such as amazon.com and youtube.com since May this year. The cybercriminals use Yahoo, Amazon and YouTube domains to infect users…

THREAT REMOVAL

Ransomware on an Upward Trend

After the successful law enforcement operation in late May that took the Gameover Zeus botnet down, CrypoLocker was almost crushed. Yet, new ransomware arises. Along with the Gameover Zeus network of infected computers, a ransomware campaign was compromised as well…

THREAT REMOVAL
kovter-ransomware

Kovter Ransomware Infections in Q2 2014 on an Upward Trend

Kovter ransomware infections have increased significantly in the second quarter of 2014, report malware researchers from the Damballa security firm. On average, the daily incidents have been up by 153% between April and May this year. The ransomware has reached…

THREAT REMOVAL
cryptowall-ransomeware

Over 625,000 Computer Systems Infected by CryptoWall Ransomware

Over 625 000 Computer Systems & 5.25 Billion Files Hostages Thanks to CryptoWall In the past six months, the users of more than 625 000 computers were attacked by the biggest and most destructive ransomware threat on Internet – CryptoWall.…

CYBER NEWS
reveton-ransom-message

New Password-Stealing Features Added to the Reveton Ransomware

The Reveton Ransomware – Your System Is Locked and You Have No Money Left in Your Pocket The Reveton Ransomware is back, and it’s updated. A new credential-stealing feature has been added to the police-ransomware, using the new version of…

CYBER NEWS

Malware Advertising Campaign Reached High-Profile Website Visitors

The Malicious Advertisements At the end of August malicious advertisements have been directing some of the visitors in several high profile websites to browser exploits that installed malware on their computers. In the period between 19th and 22nd August the…

CYBER NEWS

Six Effective Features of Google Drive That Users Barely Put to Work

The simplicity of the Google Drive applications is what makes them so popular among users. But don’t think that just because they are easy to operate, they do not have a great deal of power locked in them. The regular…

CYBER NEWS
Kelihos-Trojan

Kelihos Trojan Disguised as Anti-Government Software

Kelihos Trojan has been spreading by hackers, attacking Russian nationals, leading them into the belief that this is software designed to attack online resources belonging to US and Western governments. The new malicious campaign by the cyber criminals appeals to…

THREAT REMOVAL

ZeroLocker Crypto Ransomware Disguises as a Crypto-Malware Decryption Tool

ZeroLocker is a new crypto-malware ransomware program which acts in the disguise of a decryption tool which can rescue the data that is locked by the different threats, in case the license of the program is purchased. As a rule,…

CYBER NEWS
computer-slow-down

Top Computer Slowdown Myths Debunked

There are so many myths about PC slowdowns that sometimes computer users find it difficult to figure out the true reasons that cause the poor performance of their computers, so which are the top myths that are associated with computer…

CYBER NEWS
computer-security-mistakes

The Most Common Security Mistakes PC Users Should Avoid

Human beings are prone to mistakes but one mistake you want to avoid is to allow a hacker to access your computer and steal all your personal information. You can benefit from changing bad computer habits and prevent misfortunes by…

CYBER NEWS
Chrome warn harmfu software

Google Chrome with Option to Warn Users for Software That is Potentially Harmful

This week Google will launch a special Safe Browsing protection mechanism. It will be available in Chrome and will benefit from many capabilities including detection of deceptive software that aims to make undesired and unexpected changes to the computer of…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree