Cyber News - Page 70

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
TCL Weather Android Alcatel malware

TCL Weather Malware Found Pre-Installed on Alcatel Phones

A new security report shows that Alcatel smartphones contain an Android malware called TCL Weather. It was found installed on two phones and available on the Google Play Repository as well. TCL Weather Android Malware Bundled with Alcatel Phones Embedding…

CYBER NEWS
Microsoft logo image

KB4480960 and KB4480970 Causing Issues on Windows 7

KB4480960 and KB4480970 are two security updates published by Microsoft in January 2019 Patch Tuesday. The updates are for Windows 7 SP1 and Windows Server 2008 R2 SP1, and as evident by multiple complaints by users, they are causing troubles.…

CYBER NEWS

CVE-2018-15453 Vulnerability Affects Cisco AsyncOS

A serious security vulnerability, identified as CVE-2018-15453, in Cisco AsyncOS. More precisely, the vulnerability is located in the Secure/Multipurpose Internet Mail Extensions (S/MIME) Decryption and Verification or S/MIME Public Key Harvesting features of Cisco AsyncOS Software for Cisco Email Security…

CYBER NEWS

How to Spoof Google Search Results Using Knowledge Graph

A flaw was just discovered in Google’s Knowledge Graph, which makes it possible to manipulate search results. Shortly put, “by adding two parameters to any Google Search URL, you can replace search results with a Knowledge Graph card of your…

CYBER NEWS

Three Vulnerabilities in systemd-journald Discovered (CVE-2018-16864)

Three vulnerabilities in a component of system have been discovered by researchers at Qualys. The vulnerabilities are CVE-2018-16864, CVE-2018-16865, and CVE-2018-16866, and patches addressing them are already available. More specifically, they were were discovered in systemd-journald, which is a part…

CYBER NEWS

Unable to Uninstall Facebook on Samsung Phones? You’re Not Alone!

Have you had issues with removing permanently the Facebook app from Samsung Galaxy smartphones? You’re not the only one! Nick Winke, a photographer in the Pacific Northwest, has shared his bad experience regarding his Galaxy S8 phone, and the story…

CYBER NEWS

Intel and Facebook Working on AI Inference Chip Called Nervana

Intel and Facebook are working together on a new artificial intelligence (AI) chip. Called the Nervana Neural Network Processor (NNP-I), it is an AI chip for inference-based workloads. The new chip is expected to be finished in the second half…

CYBER NEWS

Comcast Releases AI-Powered Service to Protect Connected Devices

Comcast had made an important announcement about a new AI-powered service that is meant to monitor, block and inform customers about online threats connected to home networks. The service is called xFinity xFi Advanced Security, and its main purpose is…

CYBER NEWS

Modlishka Tool Can Bypass 2FA Authentication in Phishing Attacks

Two-factor authentication as means for securing access to services and sites is one of the recommended approaches, especially when dealing with sensitive contents and online banking. It is deemed as a safe approach as it makes hacking the accounts harder.…

CYBER NEWS

$1.1 Million in ETC Lost After Double-Spend Attacks on Coinbase

A series of attacks have been detected on the popular crypto exchange Coinbase which led to the suspension of all transactions of Ethereum Classic. The transactions are suspended on Coinbase’s trading platforms, products and services. The incident resulted in the…

CYBER NEWS

ReiKey Tool Protects Against macOS Keyloggers

It’s no news that macOS users also need protection against malicious code. The good news is that macOS users now have a new tool designed to help them identify generic keyloggers that may be plaguing their systems. The tool is…

CYBER NEWS

Meet GHIDRA, NSA’s Free Malware Disassembler Tool

GHIDRA is the name of a free reverse engineering tool that will be released by the NSA during the upcoming RSA security conference in March in San Francisco. The software is a disassembler that is designed to break down executable…

CYBER NEWS

Google Refused to Patch a Vulnerability in Android Chrome for 3 Years

Google has just fixed a three-year old vulnerability in Chrome for Android. The vulnerability was originally discovered in May 2015, but it took a while for Google to evaluate the threat and its potential. In 2015, Nightwatch Cybersecurity researchers discovered…

CYBER NEWS
social-media-privacy-regulations

Should There Be More Regulations on Social Media Privacy?

For years, social media has been rapidly growing in influence. From once being a simple way to meet up with old school friends to be a very powerful medium of expression, free speech, social engineering, gender equality, business, politics, entertainment,…

CYBER NEWS

EU Funds Bug Bounty Programs for 14 Open Source Projects

The European Union is about to sponsor 14 bug bounty programs for vulnerabilities in 14 popular open-source software projects. The announcement was made a few days ago by Julia Reda, who represents the German Pirate Party in the European Parliament.…

CYBER NEWS

Cyberattack Sabotaged Printing and Distribution of Major US Newspapers

Several of the major US newspaper saw a deliberate sabotage caused by a cyberattack taking down parts of their publishing and distribution. According to the available information the incident happened last week and the cause of it was a virus…

CYBER NEWS

The 5G Technology Raises Cyber-Espionage Concerns

5G networks are rapidly expanding across the globe, with many countries launching commercial 5G services and deploying infrastructure. Apparently, Qatar’s Ooredoo has already launched a commercial service, and South Korea and China are planning to launch 5G next year. 5G…

CYBER NEWS

Clickjacking Vulnerability Can Be Exploited to Create Facebook Worm

2018 hasn’t been easy on Facebook. The social platform has been through some dramatic data and security breaches that affected millions of its users. Facebook also experienced several drops on the stock market. It is interesting to note that Facebook’s…

CYBER NEWS

Old Windows Features We Miss Today

With Windows 10 coming out, there were a lot of new smart embedded gadgets and features that were introduced. But what about the older ones? Being in the trade for quite some time, we have decided to create this article…

CYBER NEWS
5-emerging-cybersecurity-trends-2019

5 Emerging Cybersecurity Trends in 2019

As 2018 draws to a close, it is time to get into the spirit of the New Year. It is a time of reflection and preparation for both individuals and businesses. In the field of cybersecurity, whose primary focus is…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree