Cyber News - Page 47

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Online Dating & Cybersecurity: Protect Your Heart & Your Wallet

It’s safe to say we’ve all noticed the rise in the popularity of dating across the last decade. I mean, 35 million Americans to date have tried online dating, and 59% believe online dating is a good way to meet…

CYBER NEWS

macOS More Susceptible to Adware and PUPs than Windows

The general belief for a very long time has been that macOS is safer than Windows. However, new statistics reveal that the number of Mac threats is increasing faster than the number of Windows threats. According to the 2020 Malwarebytes…

CYBER NEWS

5 Security Threats to Look Out for with Remote Workers

Remote working provides employees with an improved work-life balance, location flexibility, and greater job opportunities. Unfortunately for employers, they can be a cybersecurity nightmare if not handled correctly. To begin approaching cybersecurity management for remote workers, here are five threats…

CYBER NEWS

Privacy Commissioner of Canada against Facebook’s Privacy Practices

Canada is one of several countries that launched investigations regarding Facebook’s privacy practices following the Cambridge Analytics scandal. It comes to no one’s surprise that currently Canada’s privacy commissioner is taking Facebook to court in an attempt to force the…

CYBER NEWS

Protecting Your Data from Physical Theft: the 2020 Guide

When you think of protecting your data, does it occur to you that your data also needs physical protection? This article gives valuable insight into what to do when your data is in danger due to physical accidents. Your mobile…

CYBER NEWS

Adult Websites Suffered the Most DDoS Attacks in 2019

A new Imperva report presents a detailed analysis of the DDoS threat landscape in 2019. The report is based on statistical data of 3,643 network layer and 42,390 application layer DDoS attacks, mitigated by the company. The data was gathered…

CYBER NEWS

CVE-2020-0022: Another Dangerous Bluetooth Bug in Android

CVE-2020-0022 is a potentially dangerous remote code execution vulnerability in Bluetooth. The bug is one of the fixes in the February security updates for Android. The flaw was unearthed and reported by German security researchers from ERNW. CVE-2020-0022: What Is…

CYBER NEWS
Bot-Owners-Know-More-About-How-You-Are-Tracked-Online

Bot Owners Know More About How You Are Tracked Online

Nowadays most of us have accepted that we will regularly be tracked as we go about our daily lives. Virtually everything we do on digital devices, especially when we are connected to the internet, is followed by someone somewhere. In…

CYBER NEWS

Coronavirus Emails Are Spreading the Emotet Malware

Exploiting a viral topic for malicious purposes is something quite often seen is spam campaigns. This is what is happening now with the new strain of the coronavirus. A new spam, botnet-driven campaign is spreading malicious files masqueraded as documents…

CYBER NEWS

New Windows 10 UAC Bypass Used by TrickBot to Run with Admin Privileges

The operators of TrickBot Trojan have once again updated its malicious code, and it is now capable of leveraging a new Windows 10 UAC bypass. Through this, the Trojan is capable of executing itself with elevated privileges without displaying a…

CYBER NEWS

LiveRamp Facebook Marketing Agency Hacked and Used For Scamming

Recently news broke about an intrusion that happened back in October last year when criminals were able to break into the LiveRamp Facebook Marketing Agency. This is especially dangerous as the criminals can access sensitive information including payment data. Apparently…

CYBER NEWS

LoRaWAN IoT Protocol Can Be Easily Hacked According to New Research

A new security analysis shows that the popular LoRaWAN IoT protocol can be easily hacked thus exposing the security of the network of devices. This is especially worrying as this is one of the most popular implementations of communications used…

CYBER NEWS

Car Hacking: Are Amazon’s New Automotive Products Secure?

At this year’s Consumer Electronics Show (CES) 2020, Amazon announced several new products and services related to vehicles, including: – Alexa integrations in cars: In addition to their Alexa integrations in vehicles from Toyota, Ford, Audi and BMW, Alexa will…

CYBER NEWS

Free Proxies and VPNs – Safe or Dangerous?

We are living in a world that is heavily dependent on technology and the innovations of tech firms progressively amassing more power than any one of us in our right minds should be comfortable with. Facebook, Google, Apple, Microsoft, Samsung:…

CYBER NEWS

iPhone 11 Pro Max Hacked by The FBI Using GrayKey Tech

Appleinsider has reported that FBI has managed to succeed in breaking the encryption of the smartphone iPhone 11 Pro Max without asking Apple for help. This still does not explain why Apple has been asked by the FBI in the…

CYBER NEWS

The Emergence of Mobile Biometrics, and What to Expect in 2020

Mobile biometrics have been on the rise since Apple released Touch ID in 2013. After its release, the global market for mobile biometrics has earned over $14 billion. To paint a better picture, 57% of today’s available apps feature a…

CYBER NEWS

Large List of Hijacked IoT Data Leaked On The Internet

An unknown criminal or hacking group has leaked a very large list of Telnet credentials from IoT devices. They are mostly from consumer and commonly used networking hardware — routers, servers, access points and etc. The list was posted on…

CYBER NEWS

70,000 Tinder Photos of Women Are Being Sold on an Underground Forum

70,000 Tinder photos of women are being circulated on an underground forum typically used for selling malware. The photos are entirely of women, and cybersecurity researchers believe the photos could be used for malicious purposes. The incident was first reported…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree