Cyber News - Page 145

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
Android Devices Allow GPS and Google Maps Offline Usage

Android Devices Allow GPS and Google Maps Offline Usage

Many users were asking themselves whether they can download maps on their cellphones when they have internet connection and use them when they have no Internet access. The questions were raised as there is no cellphone coverage everywhere and often…

CYBER NEWS
Ebola-Themed-Scam-Delivers-Trojan

Ebola-Themed Scam Delivers Trojan

When it comes to the highlights of the day, cybercriminals get quite creative. Ebola-themed malware campaigns are gaining popularity these days. One of the most impressive ones is a tool that supposedly signals the users in case there is an…

CYBER NEWS
Linux-SUSE-Oct-2014

New Linux Enterprise 12 Version – Improvements by SUSE

Releasing the new Linux Enterprise 12 operating system on 27 October this year, the German dealers of the system, SUSE Linux Enterprise announced that it distinguishes from the Linux Red Hat / Ubuntu packages as more reliable, stable and secure,…

CYBER NEWS
Samsung-Knox-Vulnerabilities

Samsung Replies to Critical Report About Knox

Recently, a report criticizing Knox Technology’s password management and encryption functions in Samsung’s Note ad Galaxy mobile devices (Android-based) provoked a lot of replies and rebuttals. According to an advisory, that was published last week, a PIN selected during setup…

CYBER NEWS
New Geodo Malware

New Geodo Malware – Dridex – Known to Infect Microsoft Office Macros

During the last week, Palo Alto Networks security researchers have noticed that Dridex, the latest version of the Cridex Trojan, a data stealer also known as Feodo, Bugat and Geodo has been activated to attack bank security information through embedding…

CYBER NEWS
Dropbox-for-Business

Dropbox For Business With an Additional Security Certification

Dropbox announced the issue of ISO 27001 certificate, an addition to the serious list of compliances for Dropbox for Business. The new certificate includes 2013 revision of the standard certificate and has been updated and upgraded with the cloud services…

CYBER NEWS
TOR-Exit-Server

Malicious Binaries Delivered by TOR Exit Server

Josh Pitts with Leviathan Security discovered an ”exit node” for the TOR network that is currently located in Russia and has been used to distribute a modified version of the legitimate code that the user has requested. In order to…

CYBER NEWS
Apple-pay

New Apple Pay Privacy Method – Is It worth It?

Apple Pay method is a new way for iPhone 6 and iPhone 6 Plus users to purchase goods and services without disclosing their debit or credit cards or any other bank information to merchants, thus remaining anonymous. All the users…

CYBER NEWS
SEDNIT

Pawn Storm Uses SEDNIT for Espionage Purposes

Created in 2007, Pawn Storm is the name of a cyber-espionage operation whose main aim is targeting military, governments and media entities. The name Pawn Storm comes from a chess action where the pawns are organized into a massive defense…

CYBER NEWS
Twitch.TV

PUP and PUA Prompts on a Fake Copy of the Twitch.tv Streaming Video Platform

Twicth.tv is a web-site platform created to connect gamers throughout all over the world. Twict.tv helps gamers connect, chat and communicate no matter where they play games from. It was recently discovered that the site has a relatively good fake…

CYBER NEWS
Windows Zero-Day Misused in Hackers Attacks

Windows Zero-Day Exploited in Hackers Attacks

A new zero-day flaw has been actively exploited by cyber-criminals, targeting primarily users on workstations and servers who open files with embedded OLE (Object Linking and Embedding) objects. At the moment, the vulnerability is exploited via PowerPoint files. OLE objects…

CYBER NEWS
Malvertising Campaign Aimed at Changing the DNS Settings of Home Routers

Malvertising Campaign Aimed at Changing the DNS Settings of Home Routers

A payload for altering the DNS settings of home routers is being delivered through a malicious advertisement inserted in a big online advertising network. The definition for malvertising is an attack in which the cyber criminals take advantage of third-party…

CYBER NEWS
Zero Day Vulnerability Threatens Microsoft Windows Security

Zero Day Vulnerability Threatens Microsoft Windows Security

In a security advisory released yesterday, Microsoft has warned about a just-discovered vulnerability of all Windows systems due to security hack attacks. The threat is found in the Windows Object Linking function (OLE). The function is developed so users can…

CYBER NEWS
FIDO-USB-Port

FIDO – New 2-Step Verification Security Method – Offered By Google Now

Google have announced yesterday that they are expanding their security verification methods with one more – a USB stick security key acting as a 2-step verification method for users to log into web-sites when using the Google Chrome browser. The…

CYBER NEWS
Recentlty-Patched-Adobe-Flash-Vulnerability

A Recently Patched Adobe Flash Flaw Integrated in Fiesta Exploit Kit

A Flash Player security vulnerability that has been patched by Adobe in the most recent update of the product has been added to a commercial exploit kit, named Fiesta, known for the drive-by attacks it is used in. The flaw…

CYBER NEWS
Most popular ways less technical people fall victim to cybercriminals

Most Popular Ways Less Technical People Fall Victim to Cyber Criminals

Let’s face it – in the digital era the less technical computer users are the hackers’ favorite targets in every campaign, be that data theft or corporate espionage. In many cases, the only thing needed for the success of a…

CYBER NEWS
Icloud-china

China Connection to iCloud With Redirection to Bogus Log-In Page

People who were trying to access the iCloud service from China were recently having troubles. They have been blocked and their connection was been directed to a phishing page that collects the user credentials. The IT security specialists are figuring…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree