Cyber News - Page 38

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

CVE-2020-1464: Microsoft Didn’t Patch Zero-Day for 2 Years

The CVE-2020-1464 vulnerability was part of the 120 security flaws addressed in August’s Patch Tuesday. This vulnerability particularly stands out as it was actively expoited in malicious attacks for at least two years before Microsoft fixed it. What Is CVE-2020-1464?…

CYBER NEWS

Drovorub Linux Malware Used For Espionage Purposes by Russian Hackers

A dangerous Linux malware called Drovorub has been recently discovered to be an espionage tool used by Russian hackers in attack campaigns. Recent news about it reveals that the scope of the intrusions might be particularly high-impact. Details about it…

CYBER NEWS

Instagram Caught Keeping Deleted User Data Despite GDPR

Instagram has violated the privacy of its users by retaining peoples’ photos and private direct messages on its servers even after people deleted them. The vulnerability was discovered by researcher Saugat Pokharel when he downloaded his data from Instagram last…

CYBER NEWS

Amazon’s Alexa Hacked, Contains Threatening Vulnerabilities

Currently, more than 200 million Alexa-powered devices are being used worldwide. Amazon’s intelligent virtual assistant is holding top positions in most markets. In the U.S. alone, an eMarketer predictive analysis for 2021 shows that 70% of all smart speaker owners…

CYBER NEWS

Windows Easily Hacked Reveals August 2020 Patch Tuesday

The latest Microsoft Windows Patch Tuesday pack has been released bringing in fixes for 120 vulnerabilities. They reveal how hackers could have used exploits in order to hack into the systems using a lot of different methods and components of…

CYBER NEWS

TikTok Android App Collects User Data Even After Google Ban

The TikTok Android application has been found to exploit the Play Store services in order to bundle personalized advertising without the users consent. This practice is officially banned by Google for all applications uploaded on their repository. TikTok Collects Private…

CYBER NEWS

Samsung’s Find My Mobile Service Identified with Several Security Flaws

Samsung’s Find My Mobile feature which is part of the Galaxy series of smartphones has been found to include several security vulnerabilities. According to the available report by taking advantage of them hackers can manipulate the devices into running malicious…

CYBER NEWS

Hackers Steal Bitcoin on The Tor Network By Overtaking Exit Nodes

Hacking group have found a way to steal Bitcoin assets by redirecting transactions, this is done by taking advantage of Tor network vulnerabilities. More and more hacking groups are actively taking advantage of this opportunity, the Bitcoin cryptocurrency is detected…

CYBER NEWS

Achilles Android Vulnerability Affects Qualcomm Powered Devices

A new dangerous Android vulnerability has been identified by security experts and named Achilles. The reports indicate that devices powered by Qualcomm chipsets are affected: more than 400 bugs have been discovered. The Achilles Android Vulnerability Found in Qualcomm Devices…

CYBER NEWS

Malware Pushed Through Hacked USA Government and College Sites

A very large hacking campaign has penetrated government and college sites in the US in the end delivering dangerous malware. The criminal groups are defacing the uploaded by uploading hacking tutorials for popular online services. When the visitors open them…

CYBER NEWS

Troy Hunt’s Have I been Pwned Platform Is Going Open Source

The well-known Have I been Pwned project is going open source. The data breach search engine with hundreds of thousands of exposed records has been developed and maintained by Troy Hunt, a well-respected security and privacy expert. Who Is Troy…

CYBER NEWS

CVE-2020-13699: Critical TeamViewer Flaw Allows Hackers To Exploit User Devices

TeamViewer has been found to feature a dangerous security vulnerability tracked in the CVE-2020-13699 advisory. It allows malicious users to exploit the installed running instances. At the moment the Windows version of the application is affected. TeamViewer Windows Version Found…

CYBER NEWS

Facial Recognition Systems Bypassed Via Machine Learning Weakness

Security experts published findings on how modern facial recognition technologies can be fooled by malicious users using a discovered weakness in the machine learning algorithms used. Successful exploit of this technique will make the system think it’s seeing the target…

CYBER NEWS

CVE-2019-1457: macOS Users Hacked Via Macro-Infected Document Attacks

Computer security experts warn of a dangerous and ongoing attack against macOS users by using a flaw described in the CVE-2019-1457 advisory. Hacking groups are abusing this flaw in order to plan and execute complex infections. This is seen as…

CYBER NEWS

Ensiko Malware Can Target Linux, Windows, and macOS

Cybersecurity researchers recently discovered an advanced threat with a set of malicious capabilities, including ransomware. Dubbed Ensiko, the malware is a PHP web shell with ransowmare capabilities, which is capable of targeting Linux, Windows, and macOS machines. However, it can…

CYBER NEWS

Twitter Android Version Patched To Prevent Unauthorized Data Access

The Twitter development team announced that they have recently discovered and fixed a serious security issue in their Android client. They have found out that attackers could have used a malicious app in order to lookup private Twitter data using…

CYBER NEWS

Firefox 79 to Protect Against Redirect Tracking

Mozilla is adding a new protection feature to its Firefox browser that is designed to impede redirect tracking. In other words, Firefox 79 has added protection against redirect tracking. Redirect tracking is a new user tracking technique utilized by online…

CYBER NEWS

295 Malicious Chrome Extensions Installed by 80M Users

Security researchers reported a list of 295 Chrome extensions that hijack Google and Bing search results, and inject ads. The extensions have been installed by more than 80 million users of Google’s browser. AdGuard security researchers recently came across the…

CYBER NEWS

Expired Domain Names Are Being Registered to Point To Malware

Computer criminals have been found to abuse expired domain names by registering them once again and pointing the visitors to malware. This was a commonly used tactic for marketers and SEO specialists who used just names to point to landing…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree