Cyber News - Page 102

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
Disdain Exploit Kit

Disdain Exploit Kit Is the Newest Hacker Toy

The Disdain Exploit Kit is a hacking utility that has recently been identified on the black markets possibly being a modified version of an older threat. It is available in several versions depending on the rent and the price is…

CYBER NEWS
Windows virus

WordPress Virus Attack Carries Dangerous EV Ransomware

The popular WordPress content management system is experiencing a new wave of hacker attacks. Security experts discovered that criminals are infecting hosted services with a WordPress virus called EV ransomware. It encrypts the site’s content in a way similar to…

CYBER NEWS
ShadowPad Backdoor image

NetSarang Apps Riddled with ShadowPad Backdoor

Security researchers discovered that many connectivity products made by NetSarang are infected with the ShadowPad backdoor. This was done in a hacker attack which allowed the criminals to intrude into the company’s servers and place malicious installers in the place…

CYBER NEWS
cybersecurity image

Cybersecurity Jobs: Career Options to Consider

If you have ever wondered what it’s like to work in an exciting new career path, then computer and information security is a potential choice. This articles explores some of the most popular career propositions along with the descriptions of…

CYBER NEWS

Chrome Extensions Left Severely Compromised Amidst a Hacker Spree

Google Chrome extension developers are increasingly being targeted by attackers in a bid to hijack user’s browser traffic by phishing for sensitive information. Chrome Extensions on Attackers Hit List Recently it was reported that a Google Chrome extension by the…

CYBER NEWS

Top 10 Worst Android Applications Draining Your Battery in 2017

You may regard Android as an amazing and well optimized operating system. With the vast quantity of applications being developed each day and put on the market, it is inevitable to consider that some, if not many will be poorly…

CYBER NEWS

Why the Issue of Data Security Is Incredibly Critical to Companies

At some point last year, Yahoo was forced to go public about its data being compromised two times in relatively quick succession. With this information came a potentially instructive decision for Verizon. Would the telecommunications firm decide to let their…

CYBER NEWS

Microsoft Caves in to Kaspersky’s Demands on Windows 10

Microsoft has made concessions regarding cyber security developers and their demand to be given more time to ensure Windows 10 compatibility. Microsoft Responds to Kaspersky’s Demands on Windows 10 Kaspersky Lab has recently dropped their antitrust complaints after Microsoft decided…

CYBER NEWS

WikiLeaks Exposes CouchPotato CIA Spying Tool in a New Vault 7 Leak

Yesterday WikiLeaks exposed another utility from the Vault 7 software collection known as the CouchPotato spying tool. It is used by the intelligence agency to spy on Internet video streams which is a serious privacy invasion. Related Story: CIA Spies…

CYBER NEWS

Internal Networks Affected By Self-Propagating Emotet Trojan

Researchers have discovered a new variant of the Emotet Trojan. The variant is said to utilize features that can aid the malware to propagate over internal networks. Update November 2017: The Emotet banking Trojan has been updated to include a…

CYBER NEWS
SonicSpy Android Spyware image

SonicSpy Android Spyware Generates over 1000 Apps

Security experts identified that the SonicSpy Android Spyware is being used to generate a lot of malicious apps for the mobile operating system. In several months time the hackers have been able to create over 1000 virus instances, some of…

CYBER NEWS

The Most Notorious Linux Bugs and Vulnerabilities (Exploits)

Usually the Linux-kernel distributions are all made to be secure by design. But as long as there is code, there will be bugs and most Linux distributions are notorious for the numerous bugs that they have had over the years.…

CYBER NEWS
Magnitude Exploit kit Attacks With Cerber ransomware image

Magnitude Exploit Kit Used for Cerber Ransomware Hacker Attacks

Cyber security researchers identified that the Magnitude exploit kit is being used to spread Cerber ransomware samples worldwide. The hackers behind the large-scale campaign are using a different strategy with the hope of increasing the infection ratio. Cerber Ransomware Hacker…

CYBER NEWS
Mamba ransomware featured image

Large-Scale Mamba Ransomware Attacks on the Rise Again

The notorious Mamba ransomware that paralyzed the the San Francisco Municipal Transportation Agency back in 2016 has resurfaced. This time the criminals behind the the large-scale attacks have refocused their attention on corporations around the world. Mamba Ransomware Reactivated Once…

CYBER NEWS

Top 5 Future Cyberattacks Already Happening Now

Many of us are aware in one way or another of the nasty nature of online threats, the results of devastating cyberattacks on governments, businesses and you, the private citizen. What most people do not know is that, in the…

CYBER NEWS
Linux Security Questions image

Top 15 Linux Security Questions You Didn’t Know You Had

Beginner Linux administrators and users should know that even though the operating system is deemed secure, there are many pitfalls and details to consider. Linux security may be there by default but the various distributions may opt to enable certain…

CYBER NEWS

GPS Cybersecurity Flaws Endanger Shipping Industry

GPS may have killed the old-fashioned World War II radio navigation, but a more sophisticated and advanced version is set to make a return amid fears of GPS cybersecurity flaws that can be exploited by hackers. Evolution of GPS Navigation…

CYBER NEWS

Solar Panel Flaw Puts European Power Grids at Risk of Outages

A Dutch security researcher has found a menacing vulnerability in essential component within solar panels dispersed across Europe that if exploited, could cause serious widespread power outages in European power grids. Solar Panel Flaw Found in the Inverter Converting Direct…

CYBER NEWS

Invisible Man Android Trojan Targets Users of Banking Apps

A newly discovered Android malware is targeting banking apps to gain access to users’ bank accounts. Background Information of Banker.AndroidOS.Svpeng.ae a.k.a. Invisible Man Adobe Flash, the harbinger of video on the internet, has been immensely instrumental in its role of…

CYBER NEWS

CVE-2017-7533 – Severe Linux Kernel Vulnerability

CVE-2017-7533 is the identification of the latest vulnerability found in Linux kernel that was disclosed on August 3. The flaw is described as a “race condition” that can be exploited to allow an unprivileged local user to obtain root access…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree