Cyber News - Page 109

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Oracle Fixes CVE-2017-3622, 298 Security Flaws in April 2017’s Advisory

Oracle has just issued a patch addressing a whole lot of vulnerabilities, 299 to be particular. This patch is making a new record, breaking last year’s July patch of 276 flaws. The company has addressed 39 MySQL and 39 Oracle…

CYBER NEWS

BankBot Android Trojan Targets 428 Legitimate Banking Apps

BankBot is back, once again bypassing the security measures of Google Play Store. The banking Trojan landed for the first time in January this year, when attackers used the source code of an unnamed Android banker. Attackers took the code…

REVIEWS

No Windows 7 and 8.1 Updates for New Intel and AMD Processors

Microsoft has reportedly stopped to support AMD and Intel 7th generation software updates for Windows 7 and 8.1 versions since April this year. The updates which are stopped are exclusively for the newer generation processors of Intel and AMD. Anyone…

CYBER NEWS

Job Openings for Active LinkedIn Users Phishing Scam Detected

Yet another phishing scam involving LinkedIn has been detected. The scheme is trying to trick users of the professional network to upload their CVs. Scammers are sending emails about alleged “job openings for active LinkedIn users”. Related: LinkedIn Data Breach:…

CYBER NEWS

Kelihos Botnet Taken Down and It’s Hacker Arrested

A powerful botnet infection, going by the name Kelihos has been reported to be taken down by authorities and all of it’s infrastructure to be shut down. It’s “administrator” Peter Severa also known as Pyotr Levasho has been arrested Sunday…

CYBER NEWS

Dridex Trojan Uses New Zero-Day Exploit in Latest Attacks

A vulnerability used by the trojan horse Dridex to infect computers has been detected and reported to take advantage of Microsoft Word files. A large e-mail campaign spreading the Dridex trojan horse using a new Microsoft Word exploit has been…

CYBER NEWS

Zero-Day Exploit for Microsoft Office Allows Infection By Opening a File

An infection was discovered to even be able to exploit Windows 10 machines with latest updates, taking advantage of Mircosoft Office zero-day exploit. News have appeared of a flaw which takes advantage of absolutely all versions of Microsoft Office software.…

CYBER NEWS

Bricker Malware Disables IoT Devices Creating Risk

News broke out of a malware called BrickerBot that is new type of bricker virus that It takes control of IoT devices with vulnerabilities to disable them. Report by NetworkWorld magazine has indicated that the malware is also known as…

CYBER NEWS

Sathurbot Trojan: Another Reason Not to Download Torrents

Security firm ESET has reported new attacks associated with an iteration of Sathurbot, a backdoor Trojan that has infected more than 20,000 users. Researchers say that the backdoor has been active since June, 2016, and has been using illegal torrents…

CYBER NEWS

30 Percent of Malware Missed by Signature-Based AV, Report Shows

A recently released report by WatchGuard Technologies indicates that approximately 20 percent of today’s malware is new and zero-day-related. This simply means that traditional antivirus programs didn’t succeed in detecting and blocking the threats. The researchers gathered threat data from…

CYBER NEWS

Windows 10 Creators Update Brings in Privacy Enhancements

If you’re a Windows 10 user it’s very likely you’ve been wondering about the type of data being collected by Microsoft. The company has finally revealed this information as part of its mission to deal with privacy-related criticism and comply…

CYBER NEWS

New Bug in Wi-Fi Chip for iPhone, Samsung and Nexus Found

A new bug affecting Wi-Fi chips by Broadcom, the supplier for iPhones, Nexus and Samsung devices has been discovered by Google’s Project Zero. More particularly, researcher Gal Baniamini has provided a detailed analysis on the exploit showing how an attacker…

CYBER NEWS

Ransomware Decryption: No More Ransom Adds 15 New Decrypters

Remember the No More Ransom project? Launched in July 2016 with the collaborative efforts by Europol, the Dutch National Police, Intel Security (currently McAfee) and Kaspersky Lab, the project seeks to fight ransomware and help its victims. Since it was…

CYBER NEWS

Hack a Vulnerable Wi-Fi Vibrator Equipped with Camera: Done

Nowadays, all your devices can be hacked, your IoT sex toys included. Security researchers from Pen Test Partners have made the troublesome discovery that an Internet-connected vibrator equipped with a camera can be hacked without a hitch. As a result,…

CYBER NEWS

CVE-2017-7269 Shows Why Running Unsupported Software Is Bad

CVE-2017-7269 is a buffer overflow vulnerability that is currently being exploited in the wild. Unfortunately, Microsoft doesn’t plan on fixing the flaw because the victims are running unsupported software. The vulnerability was discovered by researchers at South China University of…

CYBER NEWS

Personalized Spear Phishing Emails Lead to Highest Ever Click Rate

Phishing attempts are constantly being improved and made more sophisticated and personalized. Currently, carefully crafted spear phishing emails are being spread posing as airlines and financial departments. The attempts go so far that they imitate internal corporate travel and expenses…

CYBER NEWS

Android Ransomware Gets Smarter, Evades AV Detection

New Android ransomware has been discovered, and apparently no mobile antivirus program has been able to detect it. The ransomware was discovered in a popular app called “OK”, a Russian-based entertainment social network app available in Google Play store. Interestingly,…

CYBER NEWS

VMWare Critical Virtual Machine Escape Flaws Patched (CVE-2017-4902)

VMware has released a security advisory regarding several critical vulnerabilities that were demonstrated during the recent Pwn2Own hacking content. The flaws could be exploited to escape from the isolation of virtual machines, researchers explain. The teams were awarded $105,000 for…

CYBER NEWS

Wikileaks Post Methods on Hacking iPhones and MacBooks

A leak on Wikileaks, part of the “Vault 7” segment has recently became famous for tricks used by the Central Intelligence Agency to hack Apple devices. Those were targeted at Apple MacOS and iOS mobile devices. And not only this…

CYBER NEWS

Dimnie Malware Stealthy Mode Finally Analyzed by Researchers

Dimnie is the name of a recently reported new malware family which has been flying under the radar for more than three years, researchers at Palo Alto Networks say. Dimnie Malware Technical Overview The malware was attacking open-source developers via…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree