Cyber News - Page 63

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

New Scranos Rookit Can Damage Your System in Multiple Ways

Scranos is the name of a new rootkit-enabled spyware which despite its current sophistication appears to be “work-in-progress”. Bitdefender researchers recently discovered that the operators of Scranos are continuously testing new components on already-infected users and regularly making minor improvement…

CYBER NEWS

CVE-2019-0859 Zero-Day: How Did the Exploit Work in the Wild?

CVE-2019-0859 is a zero-day vulnerability which was part of this month‘s Patch Tuesday. The vulnerability was detected by Kaskersky Lab researchers who just released detailed technical resume of the issue. In March 2019, Kaspersky’s Exploit Prevention (EP) systems detected an…

CYBER NEWS

Cyber Criminals Have New Targets – Online Payment Systems

Australian police forces have informed the public that cyber-crooks focus on newer targets to drain funds – online payment systems. We are talking about pension funds, salaries as well as invoice payments. The amount of money in such attacks has…

CYBER NEWS

Alexa Is Spying on You to Help Amazon Improve It

Special team has been recently assigned in reviewing audio in Alexa with the main goal to help improve the way the device responds to commands. Amazon’s Alexa has been purchased countless times and has been used by a lot of…

CYBER NEWS

Microsoft Refuses to Patch Zero-Day Exploit in Internet Explorer

Microsoft has declined to patch a zero-day vulnerability in Internet Explorer for which a security researcher published details and proof-of-concept. The flaw can allow attackers to steal files from computers running Windows. More specifically, the researcher successfully tested the zero-day…

CYBER NEWS

Phishing Statistics: 1 in 99 Emails Is A Phishing Attack

New alarming statistics reveal that approximately 25 percent of phishing emails taken from a batch of 55 million analyzed emails were marked as clean by Office 365 Exchange Online Protection (EOP). This means that these phishing emails got to recipients’…

CYBER NEWS

WPA3 Vulnerabilities Enable Attackers to Uncover Wi-Fi Passwords

A new research reveals vulnerabilities in “a limited number of early implementations of WPA3™-Personal, where those devices allow collection of side channel information on a device running an attacker’s software, do not properly implement certain cryptographic operations, or use unsuitable…

CYBER NEWS

Highly Sophisticated TajMahal APT Framework Goes Undetected for Years

A new highly sophisticated APT framework used for spying purposes was recently uncovered by security researchers. The malicious framework has been in operation for at least 5 years but it’s the first time it’s been detected. The framework has been…

CYBER NEWS

Microsoft Bugs CVE-2019-0803, CVE-2019-0859 Exploited in the Wild

April 2019 Patch Tuesday is here, consisting of fixes for 74 vulnerabilities. Note that two of the flaws (CVE-2019-0803 and CVE-2019-0859, see details below) are actively exploited in attacks in the wild. 13 of the vulnerabilities are rated critical, and…

CYBER NEWS

Verizon Fios Quantum Gateway Vulnerable (CVE-2019-3914)

Verizon Fios Quantum Gateway contains three high-severity vulnerabilities (CVE-2019-3914, CVE-2019-3915, CVE-2019-3916). which could allow command injection. When exploited at once, the flaws could give an attacker complete control over a network. Note that the device is used by millions of…

CYBER NEWS

Anubis Android Malware Spotted in New Campaigns

In December, 2017, malware researchers came across several apps that were published on Google Play and third-party app stores. The apps had surveillance capabilities. Because of the name of the malware’s payload, watchdog, the researchers named the apps AnubisSpy. Anubis…

CYBER NEWS

Exodus iOS Spyware – What Surveillance Capabilities Does It Have?

The previously known Exodus spyware which plagued Google Play Store and respectively Android devices, is now equipped with a version for iOS. According to Lookout researchers, the iOS counterpart is less sophisticated than the Android version, and hasn’t been detected…

CYBER NEWS

Beware the “IMPORTANT! You have been recorded ʍasturbating!” Scam

Another version of the “ATTENTION! You are screwed now” scam is currently circling the web. The subject line used by the scammer this time is “IMPORTANT! You have been recorded ʍasturbating! I have [email’s name].mp4!”. Related: [wplinkpreview url=”https://sensorstechforum.com/remove-save-yourself-scam/”] “Save Yourself”…

CYBER NEWS

4 Reasons Why You Receive Sextortion and Other Email Scams

Sextortion (porn blackmail) scams distributed over email are becoming increasingly popular. Individuals from all over the world are receiving threatening email messages from people (scammers) that claim they have video recordings made via the individuals’ device camera. The recording purportedly…

CYBER NEWS

Beware the “ATTENTION! You are screwed now” Scam

Another day, another extortionist scam. As we’ve already said before, all recent scams delivered via email have one thing in common – they create a sense of fear and urgency in order to persuade the recipient to transfer a large…

CYBER NEWS

Xwo Python-Based Scanner Actively Scanning for Exposed Web Services

Security researchers recently discovered a new tool that is actively scanning for exposed web services and default passwords. The researchers dubbed the malicious tool “Xwo”. The name is taken from its primary module name. Xwo is most likely related to…

CYBER NEWS

2 Third Party Apps Exposed Millions of Facebook Users Records

There are two new cases of data sets exposing tons of information belonging to Facebook users. More specifically, half a billion records of millions of users of Facebook were openly available to the public internet. The records were found on…

CYBER NEWS

3 Ways Blockchain Will Change the Way You Use Passwords

Passwords are a pain in the ass. You and I can agree on that. The number of memes out there about passwords proves the point. Sites ask for your password to contain a capital letter, lowercase letter, numbers, a special…

CYBER NEWS

CVE-2019-0211: Vulnerability in Apache HTTP Server

CVE-2019-0211 is a new vulnerability in Apache HTTP Server software. The bug which was discovered by Ambionics security researcher Charles Fol has already been fixed in the latest version of the software, 2.4.39. The update should be applied immediately –…

CYBER NEWS

Router Security: 10 Simple Tips to Protect Yourself

Routers are an important part of the communication network. This networking device forwards the data between different computer networks. Usually, cat6 outdoor cables are used for router connections. As it connects different networks, hence router security is very important. Related:…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree