Home > Kristian Iliev

Author Archive: Kristian Iliev

Second year student at The University of Edinburgh studying Social Anthropology and Social Policy. Avid enthusiast of anything to do with IT, films and watch repairs.

CYBER NEWS

GitLab Fixes Session Hijacking Bug Which Exposed Users to Cyberattacks

Attackers that were aiming to exploit users through session hijacking attacks on GitLab – the modern web-based Git repository manager have been stopped in their tracks as company fixes the bug. Hijacking Bug and Potential Damages for GitLab and Users…

CYBER NEWS

Top 6 Advanced Obfuscation Techniques Hiding Malware on Your Device

Increasingly more sophisticated and innovative ways are being developed by cybercriminals to ensure they can break into systems. Here are several obfuscation techniques employed by hackers with ways you can protect yourself from them. Obfuscation is widely used by malware…

CYBER NEWS

The Many Faces of the Jimmy Nukebot Trojan

A new variant of the Jimmy Nukebot banking Trojan has surfaced on the web with a fundamental difference in having shifted its priorities from stealing bank card data to acting as a conduit for downloading malicious payloads for web-injects, crypto…

CYBER NEWS

Onliner Spambot Harvests 711 Million Email Login Credentials

An unprecedentedly massive spambot has managed to compromise the login credentials of over 711 million people worldwide. Onliner Spambot and Why Spam Emails are Anything but a Thing of the Past A security researcher based in Paris and going by…

CYBER NEWS

Sarahah App Uploads Your Contacts List to an Unidentified Server

The widely-used application that has only recently gained popularity amassed over 18 million downloads combined both on Apple and Google online stores. Its legitimacy has come under fire with researchers discovering critical privacy issues within the application. Related Story: NetSarang…

CYBER NEWS

Mobile Carriers Could Be Putting Your Personal Information in Jeopardy

Two-step authentication has become prominent amongst many online service providers. Requiring users to log in using their phone or any other mobile device after supplying their username and password, mobile carriers might inadvertently expose their customers to cybersecurity threats simply…

CYBER NEWS
Washington citywide network compromised ransomware

Washington’s Citywide Network Compromised by a Ransomware Attack

Related Story: Solar Panel Flaw Puts European Power Grids at Risk of Outages The city of Washington became a target in the latest ransomware attack conducted in an effort to compromise the city’s entire network. It is an ominous thought…

CYBER NEWS

Intel’s 8th-Gen Kaby Lake CPU Offers 40 Percent Performance Boost

Intel has officially released the details surrounding its long-anticipated 8th generation core chips that are bound to turn thin laptops into quad-core powerhouses. Not very often do you get Intel to announce the launching of a new Kaby Lake R…

CYBER NEWS

Apple Macs Compromised by Rudimentary Mugthesec Adware

Potentially unwanted programs (PUPs) have been on the rise with Macs in the last few years. The annoying PUPs can be a pretty daunting and at points exacerbating experience. Software as such will not cease to remind you your device…

CYBER NEWS

New ‘Pulse Wave’ DDoS Attack Scheme Discovered

Previous servers thought to be secure have been discovered to expose certain vulnerabilities in DDoS mitigation solutions caused by a newly discovered method of carrying out DDoS attacks going by the name of ‘Pulse Wave.’ Discovered by Imperva Incapsula, a…

CYBER NEWS

Chrome Extensions Left Severely Compromised Amidst a Hacker Spree

Google Chrome extension developers are increasingly being targeted by attackers in a bid to hijack user’s browser traffic by phishing for sensitive information. Chrome Extensions on Attackers Hit List Recently it was reported that a Google Chrome extension by the…

CYBER NEWS

Top 10 Worst Android Applications Draining Your Battery in 2017

You may regard Android as an amazing and well optimized operating system. With the vast quantity of applications being developed each day and put on the market, it is inevitable to consider that some, if not many will be poorly…

CYBER NEWS

Microsoft Caves in to Kaspersky’s Demands on Windows 10

Microsoft has made concessions regarding cyber security developers and their demand to be given more time to ensure Windows 10 compatibility. Microsoft Responds to Kaspersky’s Demands on Windows 10 Kaspersky Lab has recently dropped their antitrust complaints after Microsoft decided…

CYBER NEWS

Internal Networks Affected By Self-Propagating Emotet Trojan

Researchers have discovered a new variant of the Emotet Trojan. The variant is said to utilize features that can aid the malware to propagate over internal networks. Update November 2017: The Emotet banking Trojan has been updated to include a…

CYBER NEWS

Top 5 Future Cyberattacks Already Happening Now

Many of us are aware in one way or another of the nasty nature of online threats, the results of devastating cyberattacks on governments, businesses and you, the private citizen. What most people do not know is that, in the…

CYBER NEWS

GPS Cybersecurity Flaws Endanger Shipping Industry

GPS may have killed the old-fashioned World War II radio navigation, but a more sophisticated and advanced version is set to make a return amid fears of GPS cybersecurity flaws that can be exploited by hackers. Evolution of GPS Navigation…

CYBER NEWS

Solar Panel Flaw Puts European Power Grids at Risk of Outages

A Dutch security researcher has found a menacing vulnerability in essential component within solar panels dispersed across Europe that if exploited, could cause serious widespread power outages in European power grids. Solar Panel Flaw Found in the Inverter Converting Direct…

CYBER NEWS

Invisible Man Android Trojan Targets Users of Banking Apps

A newly discovered Android malware is targeting banking apps to gain access to users’ bank accounts. Background Information of Banker.AndroidOS.Svpeng.ae a.k.a. Invisible Man Adobe Flash, the harbinger of video on the internet, has been immensely instrumental in its role of…

CYBER NEWS

JS_PLOWMET Fileless Windows Malware Leaves No Trace of Intrusion

As cybercriminals become progressively sophisticated and innovative in their criminal endeavours, the new fileless JS_PLOWMET malware makes it increasingly difficult for security experts to trace and locate the malware when an intrusion occurs. The malware is reported to leave no…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree