Cyber News - Page 84

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

GitHub Adds Python Security Alerts to Reduce Vulnerable Projects

GitHub has been known to support JavaScript and Ruby by providing security alerts, and now the same becomes valid for Python. In other words, GitHub has updated its security alerts feature by adding support for Python projects. This relatively new…

CYBER NEWS

Dorkbot Malware From 2012 Resurfaces and Becomes Major Threat

Dorkbot, a 6-year-old banking malware has resurfaced in the wild to become a major threat, according to recent reports. The Dorkbot banking malware reportedly started its malicious activity back in 2012 but now it seems as if this virus has…

CYBER NEWS

iPhone Users Under Highly Targeted Attack that Leverages MDM Protocol

A highly targeted malware campaign targeting iPhone users in India has been unearthed by Cisco Talos security researchers. The campaign has been active since August 2015 and is spying on 13 specific iPhones. The attackers who were most likely operating…

CYBER NEWS

Facebook Gets First Fine of £500,000 as It Failed to Be Transparent

After all the noise and headache, Facebook is finally (about to be) fined – in the U.K at least, where the company has to pay £500,000 ($664,000). The decision comes after the UK’s Information Commissioner’s Office (ICO) concluded the social…

CYBER NEWS

New Rakhni Coin Miner Virus – Chooses Mining or Ransomware Infection

A new form of malware, combining the two most prominent threats out there – cryptocurrency mining and ransomware has been detected to check which is the appropriate type of virus to be installed on your PC and then installs either…

CYBER NEWS

5.99 Billion Malware Attacks in First Half of 2018, Ransomware Prevails

Not too long ago ransomware was “dethroned” as the number one cyber threat. However, new statistics reveal that the encryption menace has returned in an increasing number of attacks. The overall volume of malware has grown as well, shows a…

CYBER NEWS
Google Chrome image

Google Chrome Mitigates Spectre Vulnerability Via Site Isolation

The recent rise of Spectre vulnerabilities that allows malicious code to hijack sensitive data is being addressed in the latest version Google Chrome. The latest security blog from the browser’s blog gives insight on Chrome’s ability to mitigate the issue…

CYBER NEWS

Facebook Gave Mail.Ru Extended Access to User Data

Following the latest Facebook privacy data scandal, it has been revealed that the company gave extended access to user data to 61 companies, including Mail.Ru. This is one of the biggest online services in the world used by many Russian-speaking…

CYBER NEWS

Security in Open Source Software Isn’t Automatic – but It Should Be

Over the past few years companies have been increasing their use of open source code to help them build more powerful applications faster. Open source components cut down application development time by providing powerful features that developers do not have…

CYBER NEWS

Dark Web Sales Offer Military Tech & Airport Security Information

The latest Dark Web sales that have been uncovered by experts reveal that hackers have gained access to very sensitive data. The latest reports reveal that among the sold goods there are secret military technology materials, operating manuals and even…

CYBER NEWS

Hide ‘N Seek IoT Botnet Updated with Database Infection Mechanisms

A new attack campaign utilizing updated instances of the Hide ‘N Seek IoT botnet are currently attacking users worldwide. The security analysis of the captured samples showcase that the updated code a wide range of databases servers support. This gives…

CYBER NEWS

Ubuntu Local Authorization Bypass Bug Likely to Never Be Fixed?

It was just reported that a bug filed on Ubuntu Launchpad (dubbed Local authorization bypass by using suspend mode) about a month ago has been confirmed by several users. The bug allows an individual with physical access to a machine…

CYBER NEWS

July 2018 Patch Tuesday Fixes CVE-2018-8281, Microsoft Office Bugs

Another set of patches has been rolled by Microsoft in the form of July 2018 Patch Tuesday. The patch batch contains a total of 54 vulnerabilities of which 17 are rated critical. 15 of those critical CVEs belong to Microsoft’s…

CYBER NEWS

Macy’s Customer Data Breach Exposes Credit Card Numbers, PII

Macy’s Customer data has been hijacked by hackers according to a notice posted by the company. The information posted reveals details about the security incident reveals that soon after the automated security systems detected the malicious user their accounts have…

CYBER NEWS
Spectre 1.1 Vulnerability

CVE-2018-3693: New Spectre 1.1 Vulnerability Emerges

The latest variant of the Spectre series of bugs have been discovered — the newest addition is the Spectre 1.1 vulnerability which is tracked under the CVE-2018-3693 security advisory. Like previous iterations it leverages a flaw that can create speculative…

CYBER NEWS

Bancor CryptoCurrency Exchange Hacked – $13.5 Million Stolen

The Israeli-based cryptocurrency exchange Bancor has been hacked, resulting in the theft of about $13.5 million worth of crypto to be stolen from the exchange. The hack, which happened back In July 9th 2018 at midnight UTC has resulted in…

CYBER NEWS

Valid D-Link Certificate Used by Plead Malware Campaigns

A new malware campaign leveraging stolen digital certificates has been discovered by security researchers at cybersecurity firm ESET. The researchers spotted the malware campaign when some of their systems marked several files as suspicious. Related Story: Malware Trends 2018: How…

CYBER NEWS

Thousands of Android Apps Can Take Screenshots of Your Activity

A new research has revealed some troubling information about several popular smartphone apps that are covertly taking screenshots of users’ activity. More specifically, researchers from Northeastern University in the US analysed over 17,000 of the most popular apps on the…

CYBER NEWS

Arch Linux AUR Repository Found to Contain Malware

The Arch Linux user-maintained software repository called AUR has been found to host malware. The discovery was made after a change in one of the package installation instructions was made. This is yet another incident that showcases that Linux users…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree