Cyber News - Page 126

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
ransomware-sensorstechforum

IoT Thermostat Hack Ends with Ransomware Infection

We already know that the Internet of things is hackable and that it provides cyber criminals another way to exploit us and our devices. Where the vulnerability of IoT is headed can also be seen in the first two episodes…

CYBER NEWS
device-hijacking-apple-vulnerabilities-stforum-2-header

Apple Bug Bounty Program Started, $200,000 for Critical Bugs

Apple followed Google and other notable software giants in creating their own Bug Bounty program. Apple Bug Bounty program provides security experts a way to make money by submitting information about vulnerabilities to Apple. Why Is Apple Joining the Bug…

CYBER NEWS
windows95-printer-vulnerability-stforum

Printer Vulnerability Since Windows 95 Put Entire Enterprises at Risk

Printer Vulnerability – How Using a Printer Can Attract Threats Every home office or business uses printers in their daily work – if we are printing out an essay at home, or we are printing out a contract in the…

CYBER NEWS
hands-woman-laptop-notebook-large

3 Offbeat Techniques to Secure Your Laptop

Today, most businesses run on laptops. Business users are often targeted by malware. One question that every business owner has to answer is how secure the laptops within their organization really are. According to CSO Online, every business should take…

CYBER NEWS
stop-ransomware-sensorstechforum

The Best Way to Beat Ransomware? Greylisting and Removal of Admin Rights

The simultaneous greylisting of applications and removal of local admin rights works as the best protection against ransomware. This is the result of a study executed by CyberArk Labs, published in August 2016. The company tested more than 23 000…

CYBER NEWS
user-tracking-fingerprinting-stforum

Battery Status API Employed for Online Tracking Reasons

Tracking is one of the serious privacy issues users are facing on a daily basis. If a party wants to get your personal information, it may get quite creative in the ways to obtain it. One of the most recent…

CYBER NEWS
android-notifications-google-stforum

Android Users Will Now Receive Native Security Notifications from Google

One of the latest security-inspired actions Google has put into motion is moving its security prompts to smartphone notifications. Until now the security notifications were sent via email and SMS. Additionally, Google plans to increase the amounts paid to bug…

CYBER NEWS
800px-Fast_attack_submarine_USS_Annapolis_(SSN_760)

Underwater Hacking: US Submarines Used for Cyber-Offensive Missions

Image Source: Wikipedia We all have heard rumors or read news about the magnitude of state-sponsored hacking and industrial cyber espionage. The level of invisible cyber invasion of which governments are capable of, however, may be a lot more advanced…

CYBER NEWS
previously-on-mr-robot-stforum

Mr. Robot Season 2 Hacks and Exploits: Darlene, the Massacre and the Trojan

SPOILERS ALERT! Have you been impatiently looking forward to Mr. Robot’s second season? Do you always have questions about the hacks that take place during the show? Are you often pausing to have a closer look at what’s written on…

CYBER NEWS
android-malware-stforum

HTML Source Code Viewer Android App Steals Media from Developers

Unfortunately, Google Play is full of booby traps and users should always be careful with the apps they install. Recent examples of applications that turned out to be more than what the user has bargained for are: Flash Keyboard Candy…

CYBER NEWS
how-fast-can-malware-spread-across-town-stforum-

Here’s How 2016 Ransomware Is Getting More Sophisticated

It’s common knowledge that ransomware has become the most feared and destructive online threat, putting the biggest of corporations on their knees. Security researchers expect it to continue evolving, in 2016 and perhaps beyond. To understand where ransomware and generally…

CYBER NEWS
antiransomware-protection-stforum

Ransomware Cyber Guarantee Offers to Pay Up to $1 Million

In late 2015, security firm SentinelOne added a brand new feature to their endpoint detection products designed specifically to restore files encrypted by ransomware. When we wrote about the company’s plans to release this solution, the component was supposed to…

CYBER NEWS
mr-robot-elliot-tyrell-stforum

Mr. Robot Season 2 Hacks and Exploits: The Hot Wallet and the Phreaker

Have you been impatiently looking forward to Mr. Robot’s second season? Do you always have questions about the hacks that take place during the show? Are you often pausing to have a closer look at what’s written on that PC…

CYBER NEWS
mac-malware-osx-stforum

5 Device Hijacking OS X CVEs Stem from Processing Image Formats

Cisco Talos security researchers have unveiled security vulnerabilities (CVEs) which could compromise Mac OS X devices. The flaws enable attackers to harvest the user’s data and can lead to remote code execution and device hijacking. The total number of the…

CYBER NEWS
Opera-bought-by-qihoo-sensorstechforum

Opera Acquired by Qihoo 360 for $600 Million

The well-known Norwegian company Opera has been sold to the Chinese company Qihoo 360, experts indicate. The deal was worth 600 million United States dollars, according to estimated reports. At the beginning of the deal, the Chinese consortium has attempted…

CYBER NEWS
spam-campaigns-sensorstechforum

Rio 2016 Olympics-Themed Scams and Malware are on the Rise

Nowadays, any international event has the potential to become exploited by hackers. The 2016 Summer Olympics, or simply referred to as Rio 2016, are definitely going to attract malicious attention, and security researchers are already making prognosis as to what…

CYBER NEWS
It’s 2016! Let’s Look Beyond Antivirus for Protection Against Advanced Malware

Kaspersky, AVG, Symantec, Microsoft Affected by Code Hooking Bug

Security researchers at enSilo have come to some shocking conclusions in terms of the hooking and injection methods employed by various vendors. Their research started in 2015 when they noticed an injection issue in AVG. Later, they found similar problems…

CYBER NEWS
phishing-credit-card-stforum

Crooks Find a New Way to Steal Credit Card Data from Online Shoppers

How safe are my credit card data and credentials? Because cyber crooks are continually working towards improving their methods, this is a question that deserves addressing on a daily basis. New Scam Combines Phishing and Infection of Legitimate Pages to…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree