Cyber News - Page 147

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
fake-Viber-email

Fake Viber Email Notification Spreads Asprox Botnet

The users of Viber are now under the attack of a new malicious campaign. The users are tricked into accepting the Asprox Botnet malware by getting a notification email for a missed call message they get in Viber. The body…

CYBER NEWS
facebook-ad-platform

Users Tracked by Brands Through the New Atlas Ad Platform on Facebook

Facebook has launched a brand new ad platform called Atlas. The aim of this platform is to allow brands to track the users around the web and not only on Facebook. This means that Facebook now knows more about the…

CYBER NEWS
vawtrak-malware-is-back

Vawtrak Malware with New Targets

It seems like eliminating a Trojan in this day and age is a rather impossible task. Analysts at Phishlab report that a malware piece that was active in the mid-2000s, Vawtrak, is back on the field. What Has Been Vawtrak…

CYBER NEWS
OS X-safe-against-bash-flaw

Mac OS X Safe Against Bash

Apple announced that all users of Max OS X should feel safe concerning the serious bug that was discovered in Bash. In a statement, the company confirmed that the majority of Apple users are not at risk and further stated…

CYBER NEWS
Linux and Mac Computers Hijacked

Bash With a Bug, Many Linux and Mac Computers Hijacked by Attackers

A very serious bug was discovered in Bash, a much popular command interpreter, posed a serious security risk to the Linux and Unix systems. According to the security experts, this problem should not be regarded as a server issue and…

CYBER NEWS
yahoo

Government Data Requests Dropped, Yahoo Reports

The personal information of the users that has been collected by companies such as Facebook and Google has turned them into targets for the intelligence agencies and governments looking for information. At the same time, however, the number of the…

REVIEWS
basic-software-windows

Basic Software Programs for Windows Users

Among the many programs and applications that a user can download for free or purchase from a licensed developer, there is a bare minimum of programs needed for the proper work of any Windows PC. Here is a list of…

CYBER NEWS
iPhon-6-plus-bending

Is That an iPhone 6 Plus Bending in Your Pocket?

The owners of the new iPhone 6 Plus are already complaining about it. When wearing the new iPhone model in their trouser pockets, some owners were unpleasantly surprised that it bends. A few days after the release of iPhone 6…

CYBER NEWS
how-tor-browser-works

Tor Browser Allows Users to Surf the Web Anonymously

Several sources, among which the websites BoingBoing and PCworld, have recently published articles about librarians from Massachusetts installing the software Tor on all public PCs they have in order to allow their patrons use the web anonymously. The librarians are…

CYBER NEWS
DDoS attack methods

Frequent DDoS Attacks Against Gaming Sites

A worrisome trend has been spotted recently of continuous DDoS attacks. After the Lizard Squad attack against Destiny and Call of Duty servers, the researchers confirmed a high volume of attacks that happened in the first six months of 2014.…

CYBER NEWS
Kyle & Stan With Bigger Reach

Kyle & Stan Malvertising Network With Bigger Reach

Current situation The researchers had an unpleasant surprise two weeks ago, after the release of the first Cisco report concerning the malicious ad distribution campaign, according to which the malvertising network of Kyle and Stan has approximately nine times bigger…

CYBER NEWS
home depot teaching kids to build

Security Breach at Home Depot exposing more than 55 million credit cards

Home Depot suffered a security breach, which exposed at risk the users of 56 million unique credit cards. The hackers’ attacks and the malware have been dealt with according to information offered by the company. The malware was present in…

REVIEWS
13 TIRANIUM_ANTIVIRUS_2014_TEST_2

Is Your Antivirus to be trusted? / To Trust or Not to Trust Your Antivirus

Earlier this year the malware researcher Neil J. Rubenking published a review concerning Tiranium Premium Security 2014. After the review was published, he got a message from a user claiming that Tiranium abused different online websites associated with malware checks…

CYBER NEWS
browser-disabled

Android Browser with a Flow Attacking User’s Privacy

What Is the Android Browser Security Bug Android Security Bug has been found by the independent security researcher Rafay Baloch and is affecting 50 % of the Android users. The security bug has been found in the Android Browser app,…

CYBER NEWS
kindle-bug

Malicious Kindle Ebooks Help Hackers Access Amazon Accounts

The feud between book lovers about paper and electronic devices is constantly growing. If you are among the ones preferring to enjoy their read on a mobile device, you should be a bit more careful. Kindle Ebooks Injected with Malicious…

CYBER NEWS
malicious-email

Giveaways of a Malicious Email

Warning! This Email Is Malicious! Nowadays emails get proper spam filtering. Not long ago it was a lot easier for spam email to end up in your inbox. Luckily this is history now, especially if you use Gmail. Keep in…

CYBER NEWS
Apple-Two-Factor-Verification

Apple’s iCloud with Two Factor Authentication

Shortly after the scandal with the nude celebrity pictures that leaked online, Apple has activated a 2FA (two-factor authentication) for iCloud. In the 2FA process user has to enter additionally a second passcode, which is dynamically generated and consists of…

CYBER NEWS
Zemot-Malware

Zemot Malware: Delivered with Exploit Kits and Asprox Botnet

What Is Zemot? Zemot Dropper is a type of malware downloader. It is part of a complex network, which includes different malware types. Different variants of Zemot can be distributed with other malware as one dropper can spread many malicious…

CYBER NEWS
phishing-scheme

A Twitter Phishing Campaign Is After User’s Credentials

A campaign run on Twitter tries to lure users into landing on a phishing page which only goal is to get users’ credentials. It seems that either compromised Twitter accounts or bots are used to deliver a spam message with…

CYBER NEWS
Chrome-Web-Store

Malicious Apps Still End Up in Chrome Web Store

For some time now, Google has been trying to limit the security issues related to the numerous applications that get installed on Google Chrome along with the installation of various unverified extensions. It is mandatory for apps and extensions that…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree