Best Security Search
  • Ransomware
  • Browser Hijackers
  • Trojans
  • Mac Viruses
  • Tutorials
  • Tech support scams
  • Security News
Martin Beltov

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

Tutorials

Three Secure Ways for Distributing Files

Sending and receiving files in a secure manner can be difficult, especially when the users don’t trust the remote servers or cloud service providers

Martin Beltov 9 years ago Read more...


Tutorials

Overview of Linux Encryption Methods

Encryption methods for Gnu/Linux allow computer owners to protect their stored data in a safe manner. Depending on the encryption method users can experience

Martin Beltov 9 years ago Read more...


Tutorials

Security Tips for IoT Owners

As more and more IoT smart devices get vulnerable to security exploits, the associated risks of malicious infiltration get higher. The Internet of Things

Martin Beltov 9 years ago Read more...


Security News

The IoT Threat Is Real, Smart Thermostats Infected with Ransomware

Security researchers from the United Kingdom demonstrated the world’s first ransomware attack against smart thermostats, one of the many IoT (Internet of Things) devices

Martin Beltov 9 years ago Read more...


Security News

New Brazilian Trojan Bypasses PowerShell Security Policies

Security experts discovered a new Trojan virus that targets hosts in Brazil. The new malware is a formidable threat as it bypasses Powershell execution

Martin Beltov 9 years ago Read more...


Ransomware

The Latest Update to the Cerber Ransomware Renders Decryptors Useless

The criminals behind the dreaded Cerber ransomware have released an update to the malware source code that renders the known decryptors useless. They have

Martin Beltov 9 years ago Read more...


Security News

Wikileaks Uploads Malware Among Leaked Messages

The Wikileaks website hosts 324 confirmed cases of malware according to one of the leading Bulgarian cyber security researchers Vesselin Bontchev. The dangerous computer

Martin Beltov 9 years ago Read more...


Security News

Eddie Bauer hit by POS malware

The Eddie Bauer stores were the target of malware that infected the point-of-sale systems. The criminals that inflicted the damage were able to harvest

Martin Beltov 9 years ago Read more...


Security News

Dutch Researchers Compromised Cloud Linux Virtual Machines

A group of Dutch security experts has demonstrated a modified Rowhammer attack against cloud Linux virtual machines. The intrusion was tested on two different

Martin Beltov 9 years ago Read more...


Security News

Issues in IoT Smart Sockets Expose Network to Remote Attacks

Several severe vulnerabilities have been identified in one of the most popular brands of smart sockets. The affected devices allow malicious users to infiltrate

Martin Beltov 9 years ago Read more...


  • <<
  • 1
  • …
  • 126
  • 127
  • 128
  • 129
  • 130
  • …
  • 132
  • >>
Stop/DJVU Eventful Version Update and Removal Options
should-I-buy-anti-malware-protection-for-my-PC
Five-Tips-for-Your-Online-Privacy-Infographic-Protect-Yourself-Bestsecuritysearch

Categories

  • Browser Hijackers
  • Mac Viruses
  • Ransomware
  • Security News
  • Tech support scams
  • Trojans
  • Tutorials

About Us | Terms of Service

© BestSecuritySearch.com