Cyber News - Page 131

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
image-captcha-facebook-blackhat-stforum

Facebook’s and Google’s CAPTCHAs Defeated!

CAPTHAs, or Completely Automated Public Turing test to tell Computers and Humans Apart, can be pretty annoying sometimes, but, in terms of online security, they are a necessary evil. Unfortunately, Google’s and Facebook’s CAPTCHA services have been broken down by…

CYBER NEWS
pexels-photo-67112

Let’s Google Google! Not so Popular Facts about The Search Engine

Image Source: Pexels.com Can you imagine your life without Google? Perhaps you can, perhaps you can’t. And perhaps it depends on whether you were born before or after Google was introduced to the world. Nonetheless, the truth is we use…

CYBER NEWS
password-brute-force-stforum

Brute Force Attacks – a Threat to Encryption

What Is a Brute Force Attack? Brute force attacks may sound like something very complicated but they are easy to explain and understand. However, the protection against them is not as easy to achieve. In the language of cyber security,…

CYBER NEWS
missing-files-1

Obfuscation in Malware – the Key to a Successful Infection

Malware attacks are on the rise and as CRO of F-Secure Mikko Hypponen said on Ted talks – “It is no longer a war against our computers, it is now a war against our lives.” To better protect ourselves from…

CYBER NEWS
world-backup-day-stforum

World Backup Day: to Backup or Not to Backup My Computer Files?

Image Source: www.gotcredit.com Today is World Backup Day. So, why is it so important to backup your files? Let’s see: The cat jumps on your desk and walks by the lap top spilling the coffee on your keyboard – as…

CYBER NEWS
pexels-photo-51415

Advanced Persistent Bots Can Mimic Human Behavior

We know about advanced persistent threats. But what do we know about advanced persistent bots? Advanced Persistent Bots – The New Emerging Threat According to the latest annual report by Distil Networks, the number of bad bots has increased sensibly…

CYBER NEWS
stfu-usb-thief

New USB Thief Trojan Now Has the Ability to Self-Protect

ESET researchers have identified an Infostealer Trojan that is activated via USB drive specially configured for it. The info stealer can slip past antivirus software undetected and run as a legitimate svchost process in Windows. The malware’s detections names given…

CYBER NEWS
apple-imac-ipad-workplace-38568

Apple’s Zero-Day Bypasses System Integrity Protection in iOS and OS X

A zero-day flaw in Apple’s OS X may sound like something rather impossible. Unfortunately, researchers have indeed discovered a zero-day vulnerability that enables attackers to exploit key protection feature in the believed-to-be invincible operating system. As revealed by SentinelOne researcher…

CYBER NEWS
pexels-photo-59628

Google Knows About You, Know About Google!

Google is, pretty much, the Internet. All we do online is somehow related to the search giant. There’s hardly a person without a Google account. It’s only logical that if you use Google, Google will know a lot about you.…

CYBER NEWS
android-app-permission-stforum

Android App Permissions and Your (Phone’s) Privacy

Owning and using a smartphone is one of the perks of living in the 21st century. Smartphones connect us with each other in various interactive ways, and help us get hold of information instantly. However, the extensive use of smartphones…

CYBER NEWS
zerocopter-vulnerability-detection-tool-stforum

Vulnerability Detection Tool Released against Drown, Heartbleed

Vulnerabilities are a common and dangerous problem that exposes users and companies to various cyber threats. Some vulnerabilities can be quite scary, like the infamous Heartbleed bug and the very recent Drown attack. Learn More about The Drown Attack Luckily,…

CYBER NEWS
windows-update-troubleshooter-stforum

How to Troubleshoot Problems with Windows Update and More

No matter how irritating Windows updates may be, they should not be neglected. Neglect them, and who knows what form of advanced malware will strike your system. Unfortunately, in some cases our good will is not enough and Windows Update…

CYBER NEWS
keep-calm

Do You Need Antivirus Software on Android, iOS and Windows Phone?

Having an active anti-malware/ antivirus protection on your desktop computer is a must. However, with the rise of mobile devices, comes a logical question. Shouldn’t we be worried about the safety of our mobile devices just as much? Not to…

CYBER NEWS
tor-browser-busted-user-fingerprinting

Tor Browser Users Fingerprinting: Mission Possible

For many users, Tor is the online version of a scapegoat, as it is religiously used to hide one’s sins. In other words, Tor (an acronym for The Onion Router, the project’s original name) is widely accepted as anonymous and…

CYBER NEWS
patch-tuesday-sad-face-stforum

From KB 3142015 to KB 3141780: MS Security Bulletin, March 2016

Patch Tuesday for March 2016 is already a fact. Microsoft has just released 13 security bulletins, aimed at a total of 44 vulnerabilities. 5 of the updates are critical and are addressing remote code execution issues in Windows (such as…

CYBER NEWS
shutterstock-malware

97% of Malware Infections Are Polymorphic, Researchers Say

2015 has been a cornerstone in cybersecurity. And all the reports released by security vendors prove it. From ransomware and banking botnets, through targeted attacks and massive data breaches, to “average” social engineering and spam campaigns, malware researchers have seen…

CYBER NEWS
south-park-truth-and-advertising-stforum

Truth and Advertising IRL: Stop Targeted Ads from Following You

Ads following you around much like a stalker in flesh and blood are not just featured in the iconic South Park episode Truth and Advertising, but part of the online reality we live in. Interest-based, or targeted, advertising is here…

CYBER NEWS

The DROWN Attack, or How to Intercept HTTPS Communications

Just when things got quiet around the infamous Heartbleed bug, a new vulnerability comes around and bites us. The question surely is how hurtful the bite is. Well, quite a lot. According to security researchers, DROWN, the new vulnerability in…

CYBER NEWS
banking-malware-stforum

ATMZombie Hits Hard Israeli Banks, Uses Proxy-Changing Techniques

A curious fact – Israeli banks haven’t been targeted by banking malware. Until now. Kaspersky researchers have recently discovered the very first banking Trojan doing just that, targeting Israeli banks. The Trojan has been dubbed ATMZombie. ATMZombie applies the well-known…

CYBER NEWS
ransomware-message-CTB-Locker-stforum-kaspersky-lab

New CTB-Locker Variant Targets Vulnerable Web Servers

Ransomware, just like any other cyber threat, is constantly evolving and adding new features to its set of capabilities. Ransomware affiliate programs are also a big factor, as any wannabe cyber criminal with basic skills can now join and make…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree