Cyber News - Page 104

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

REVIEWS
Internet Web (WWW) image

Going Underground: How the Dark Web and Deep Web Work

Over the past few years the TOR hidden network and other related services have been featured prominently on the news as part of the so-called Dark Web or Deep Web. There is a large difference between these three computer networks.…

CYBER NEWS

The Future Is Here: Employees Getting RFID Chips Implanted

The employment of implanted chips may have seemed like a conspiracy not too long ago but it’s already a fact. A scary fact. Apparently, an American company, 32M, is now offering chips to employees willing to get the implant in…

REVIEWS
Debian Linux Server screenshot image

The Best Linux Server Distributions in 2017

Gnu/Linux is one of the leading server operating systems due to its ability to be adapted to different devices and architectures. When faced with the decision to implement a server on your home or company network, probably one of the…

CYBER NEWS

Ovidiy Stealer Is the New Hit Malware Sold for 7 Dollars

A newly discovered malware has captured the interest of both security experts and computer hackers. It is called the Ovidiy Stealer and it is being sold on underground hacker markets for a price as low as 7 US Dollars. It…

CYBER NEWS
The Most popular hacking tools in 2017 cover image

The Most Popular Hacking Tools in 2017

Computer criminals constantly attempt to break in to user and company devices and networks. And while this process may seem like wizardry, in most cases they actually use sophisticated software and code. Our article aims to showcase the most popular…

CYBER NEWS

GhostCtrl Android Virus – Spying Users Worldwide

Security engineers identified the GhostCtrl Android virus family that has the ability to spy on the users at all times. The malicious code contains a fully-featured surveillance module that can record and transmit audio, video, screenshots and other sensitive data…

CYBER NEWS

Twitter Adult Content Spam Spreads via New Botnet Attack

Over the past few months security experts identified a large-scale Twitter Adult Content Spam botnet attack. The instance is being used to generate and operate thousands of fake accounts that feature links leading to an affiliate network. Related Story: Twitter…

CYBER NEWS

Google and Facebook to Give Government Access to User Messages?

Australian government proposed a new cybersecurity law that forces web services such as Google and Facebook to lower their encryption systems. According to the motion the companies are required to provide access to law enforcement agencies. Related Story: Australia’s Facial…

CYBER NEWS

CIA HighRise Android Malware – An Effective Spying Tool

WikiLeaks reported that the CIA is involved in the creation and coordination of a dangerous Android malware called HighRise. The report showcases the full features of HighRise as well as a copy of the Users Guide. Related Story: BothanSpy, Gyrfalcon…

CYBER NEWS

Kali Linux – This Is What You Need to Know Before You Start

Kali Linux is one of the most famous and widely used Linux distributions for security testing, digital forensics and penetration testing. It has grown in popularity so fast that it is now perceived as an essential part of every security…

CYBER NEWS

Kaspersky Anti-Virus No Longer Allowed by the US Government?

The Kaspersky Labs security products are now banned for use by the US government agencies according to several reports. The concerns are linked to potential links between the company and the Russian Federation intelligence services. The General Service Administration (GSA)…

CYBER NEWS

Healthcare Cybersecurity in a Poor State of Health

There cannot be two opinions when it comes to the impact that technology and connectivity have had on the Healthcare sector. Whether it’s keeping the e-records of thousands of patients or using the connected devices to execute various purposes —…

CYBER NEWS

BothanSpy, Gyrfalcon CIA Implants for Windows, Linux Steal SSH Credentials

BothanSpy and Gyrfalcon are the names of the latest CIA hacking tools unearthed by WikiLeaks and the already legendary Vault7 dump. The tools are in fact implants designed to steal SSH credentials from two operating systems – Windows and Linux.…

CYBER NEWS

Petya Ransomware Master Decryption Key Published (Update July 2017)

The creator behind the ransomware virus Petya which is connected to the recent ransomware outbreak which is still ongoing, has released the master decryption key. Dubbed Janus, the creator of Petya was not involved in the outbreak attacks and it…

CYBER NEWS

AlphaBay Dark Web Marketplace Down and It’s Not for Maintenance

AlphaBay market, one of the largest Dark Web markets for illegal inventory like drugs and guns has been down since Tuesday night. The site is often down due to maintenance reasons but this time around things may be different s…

CYBER NEWS

Less Malware for Windows, More for MacOS and Linux (Report 2016)

Due to its global dominance on the market, Windows has always been the most targeted operating system out there. However, Microsoft has been struggling to secure its product which has led to a (not that) surprising outcome. It turns out…

CYBER NEWS

Pre-Installed Dell Software Flaws Could Disable Security Mechanisms

Are you a Dell customer? Be alert as Talos researchers have discovered that Dell’s pre-installed software contains vulnerabilities that could allow attackers to disable security programs. The flaws could also lead to escalation of privilege attacks. Related Story: Dell Tech…

CYBER NEWS

Bitcoin, Ethereum Exchange Bithumb Hacked, Millions Stolen

Bithumb, the fourth largest Bitcoin and the biggest Ethereum exchange has been just hacked. The unfortunate event has resulted in the loss of over $1 million in cryptocurrencies. As for the hacking itself, it has been done via compromised user…

CYBER NEWS

Complete Break of Libgcrypt RSA-1024: CVE-2017-7526, CVE-2017-9526

Are you a Linux user? Make sure to check whether a bug in libgcrypt20 has been patched. Researchers David Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal and Yuval Yarom from various respected…

CYBER NEWS

Next Generation Security Coming to Windows 10 Fall Creators Update

Just a couple of days ago, Microsoft announced the comeback of the Enhanced Mitigation Experience Toolkit (EMET for short). Also, new vulnerability mitigations are being introduced to Windows in a new feature dubbed Windows Defender Exploit Guard. In short, the…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree