Cyber News - Page 70

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

$1.1 Million in ETC Lost After Double-Spend Attacks on Coinbase

A series of attacks have been detected on the popular crypto exchange Coinbase which led to the suspension of all transactions of Ethereum Classic. The transactions are suspended on Coinbase’s trading platforms, products and services. The incident resulted in the…

CYBER NEWS

ReiKey Tool Protects Against macOS Keyloggers

It’s no news that macOS users also need protection against malicious code. The good news is that macOS users now have a new tool designed to help them identify generic keyloggers that may be plaguing their systems. The tool is…

CYBER NEWS

Meet GHIDRA, NSA’s Free Malware Disassembler Tool

GHIDRA is the name of a free reverse engineering tool that will be released by the NSA during the upcoming RSA security conference in March in San Francisco. The software is a disassembler that is designed to break down executable…

CYBER NEWS

Google Refused to Patch a Vulnerability in Android Chrome for 3 Years

Google has just fixed a three-year old vulnerability in Chrome for Android. The vulnerability was originally discovered in May 2015, but it took a while for Google to evaluate the threat and its potential. In 2015, Nightwatch Cybersecurity researchers discovered…

CYBER NEWS
social-media-privacy-regulations

Should There Be More Regulations on Social Media Privacy?

For years, social media has been rapidly growing in influence. From once being a simple way to meet up with old school friends to be a very powerful medium of expression, free speech, social engineering, gender equality, business, politics, entertainment,…

CYBER NEWS

EU Funds Bug Bounty Programs for 14 Open Source Projects

The European Union is about to sponsor 14 bug bounty programs for vulnerabilities in 14 popular open-source software projects. The announcement was made a few days ago by Julia Reda, who represents the German Pirate Party in the European Parliament.…

CYBER NEWS

Cyberattack Sabotaged Printing and Distribution of Major US Newspapers

Several of the major US newspaper saw a deliberate sabotage caused by a cyberattack taking down parts of their publishing and distribution. According to the available information the incident happened last week and the cause of it was a virus…

CYBER NEWS

The 5G Technology Raises Cyber-Espionage Concerns

5G networks are rapidly expanding across the globe, with many countries launching commercial 5G services and deploying infrastructure. Apparently, Qatar’s Ooredoo has already launched a commercial service, and South Korea and China are planning to launch 5G next year. 5G…

CYBER NEWS

Clickjacking Vulnerability Can Be Exploited to Create Facebook Worm

2018 hasn’t been easy on Facebook. The social platform has been through some dramatic data and security breaches that affected millions of its users. Facebook also experienced several drops on the stock market. It is interesting to note that Facebook’s…

CYBER NEWS

Old Windows Features We Miss Today

With Windows 10 coming out, there were a lot of new smart embedded gadgets and features that were introduced. But what about the older ones? Being in the trade for quite some time, we have decided to create this article…

CYBER NEWS
5-emerging-cybersecurity-trends-2019

5 Emerging Cybersecurity Trends in 2019

As 2018 draws to a close, it is time to get into the spirit of the New Year. It is a time of reflection and preparation for both individuals and businesses. In the field of cybersecurity, whose primary focus is…

CYBER NEWS

Google and Yahoo Targeted in Tricky Phishing Campaign That Bypasses 2FA

Google and Yahoo have been targeted in new phishing attacks that are able to bypass two-factor authentication (2FA). Secure email services are also victims of these attacks as they can be successfully compromised, researchers said in a report published by…

CYBER NEWS

CVE-2018-8653 in Internet Explorer: Microsoft Patches Yet Another Zero-Day

Microsoft has just released a security update for Internet Explorer after receiving a report from Google about a new vulnerability being used in targeted attacks. The vulnerability, which was given the CVE-2018-8653 identifier, could allow for arbitrary code execution. Affected…

CYBER NEWS

NASA Data Breach Potentially Exposes Personal Information of Employees

NASA has been through a data breach which most likely affected the personal details of both current and former employees. At least one of NASA’s servers has been hacked. According to the agency, unknown hackers successfully gained access in late…

CYBER NEWS

Windows Sandbox Feature Will Be a Fact in Early 2019

Microsoft just announced that Windows 10 19H1 will be equipped with a sandbox feature starting early in 2019. Windows Sandbox is an isolated, temporary, desktop environment where users can run untrusted software without the fear of negative effects on their…

CYBER NEWS

Text-Based CAPTCHA Protection Defeated by Machine Learning Algorithm

Scholars have identified yet another way to defeat text-based CAPTCHA systems using a machine learning algorithm. The new “captcha solver” method was developed by scientists from UK’s Lancaster University, China’s Northwest University and Peking University. The method is built upon…

CYBER NEWS

Magellan SQLite Vulnerability Affects Chromium, Thousands of Apps

Security researchers just discovered a security flaw residing in the popular SQLite database engine. The vulnerability hasn’t been given a CVE identifier yet but is dubbed Magelan. It affects thousands of desktop and mobile applications, including IoT devices, desktop software,…

CYBER NEWS

US Ballistic Missile System Lacks Basic Cybersecurity Implementations

A security audit of the US ballistic missile system carried out by the US Department of Defense Inspector General (DOD IG) has revealed a range of severe security issues. The report was conducted in response to a congressional requirement to…

CYBER NEWS

Deleting Your Data, Reclaiming Your Online Privacy, and Wishful Thinking

“My take is, privacy is precious. I think privacy is the last true luxury. To be able to live your life as you choose without having everyone comment on it or know about,” said spy novelist Valerie Plame. Defending your…

CYBER NEWS
browsing without fear of hackers by using vpn

Browsing Without Fear of Hackers By Using a VPN

What Can Hackers Do If You Have an Insecure Connection? The fear of hackers exists because that is a legitimate threat. There are different hackers out there, but your biggest concern should be black-hat hackers. Black hats break into networks…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree