Cyber News - Page 86

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
TLBleed Vulnerability image

TLBleed Vulnerability Affects Intel Processors Following Meltdown

Following the sequence of dangerous vulnerabilities identified in Intel processors, researchers have found a yet another dangerous bug. The latest issue has been identified as the TLBleed vulnerability which is currently regarded as one of the critical problems with contemporary…

CYBER NEWS

WPA3 Takes Wi-fi Security to the Next Level, Following the Krack Attack

A new announcement has been made in regards of the Wi-Fi Alliance (the organization managing wireless internet technologies): the official release of WPA3 is already a fact: Wi-Fi Alliance® introduces Wi-Fi CERTIFIED WPA3™, the next generation of Wi-Fi® security, bringing…

CYBER NEWS
WordPress Security

7-Month-Old WordPress Security Bug Remains Unpatched

A new WordPress security bug has been reported by specialists that affects a large percentage of the sites worldwide. This is one of the most popular platforms and the discovery of the vulnerability gives hackers the ability to execute arbitrary…

CYBER NEWS
Bitcoin Airdrop Scams cover image

Bitcoin Airdrop Scams: How To Protect Yourself from Phishing Attacks

The rise of the cryptocurrency deals with Bitcoin and its many alternatives has led to the creation of coordinated phishing attacks of the so-called “Bitcoin Airdrops”. The criminals behind the campaigns note that computer users seek various ways in order…

CYBER NEWS

iPhone and iPad Devices Security Bypassed Via New Method

iPhone and iPad devices are noteworthy for having various security measures that protect them from abuse. Since iOS 8 they have been protected with an advanced encryption algorithm that protects them from being unlocked by hackers. However a security researcher…

CYBER NEWS

Apple Patches The iPhone Bypass Used By the FBI

Apple announced that they are going to fix the iPhone bypass that is used by the FBI and other government agencies in investigations. It has been known to exist for quite some time however the company was hesitant to remove…

CYBER NEWS
Red Alert 2.0 Android Trojan image sensorstechforum com

Red Alert 2.0 Android Trojan Offered on The Hacker Markets

Security experts have discovered that a new threat has appeared on the hacker underground markets called the Red Alert 2.0 Android Trojan. It is an updated version of a previous virus made for the mobile operating system which can cause…

CYBER NEWS

Android P to Get Better Biometrics against Spoofing Attacks

A new anti-spoofing feature is about to be introduced to Android which will make biometric authentication mechanisms more secure. As explained by Google: To keep users safe, most apps and devices have an authentication mechanism, or a way to prove…

CYBER NEWS
Advanced Battery Saver Android App

Advanced Battery Saver Android App on Google Play Hijacks Private Data

Security researchers alerted that hackers are distributing a malware Advanced Battery Saver Android on the Google Play Store. The hackers hijack personal data and reconfigure the devices in order to perform various system modifications. It is rated as a very…

CYBER NEWS

Encrypted GZipDe Malware Distributes Metasploit Backdoor

A new piece of, what appears to be, highly targeted malware has been discovered by researchers at AlienVault. The new malware strain, dubbed GzipDe and most likely used in cyber-espionage campaigns, uses an article about the next Shanghai Cooperation Organization…

CYBER NEWS

7 Vulnerabilities in 400 Axis Camera Models Unearthed (CVE-2018-10658)

Several critical vulnerabilities have been uncovered in some 400 Axis camera models. The flaws could allow hackers to take full control over the affected camera or entangle them in botnets. VDOO researchers unearthed the vulnerabilities that could be compromised via…

CYBER NEWS

How to Download All Your Facebook Data (Photos, Messages, etc.)

This is an instructive article which aims to provide explanations on how you can download all of your Facebook information, which does include personal, security and media data which Facebook has been storing for you. Facebook is one social media…

CYBER NEWS

Sophisticated Mylobot Botnet Discovered During Security Audit

The Mylobot botnet has been discovered in a recent worldwide attack, upon analysis it has been found to contain an advanced malware engine. It can execute several different components depending on the targets, the hackers behind it are still unknown.…

CYBER NEWS

CVE-2018-8235: Security Feature Bypass Bug in Edge, Patch Now!

An independent security researcher has uncovered by accident quite the unusual, high-severity browser vulnerability in Microsoft Edge, identified as CVE-2018-8235. Shortly put, the vulnerability would allow a malicious website to recapture content from other sites simply by playing audio files…

CYBER NEWS

Andy Android Emulator Program Detected with Coin Miner Virus

A miner malware for crypto has been detected in the Andy Android Emulator program for Windows after an investigation was performed by it’s user community. It seems as if the coin miner malware trend is taking the world by storm…

CYBER NEWS
ZeroFont phishing attack image

ZeroFont Phishing Attack Bypasses Office 365 Security

A new dangerous hacker tactic has been identified as the ZeroFont phishing attack which is responsible for infections caused by Office 365 manipulation. This is done by using social engineering tactics that manipulate the users into interacting with attached documents…

CYBER NEWS

Beware! 2018 “Olympic Destroyer” Worm and It’s Hackers are Still Active

News have recently broken out that the same hacking group who have been detected to spread the malware, known as “Olympic Destroyer” to still be active and targeting different threat prevention facilities all over Europe and financial facilities in Russia.…

CYBER NEWS
HeroRat Trojan image

HeroRat Trojan Uses Protocol from Telegram to Communicate

HeroRat is the newest Trojan threat that appears to use the Telegram protocols in order to set up a secure connection to the hacker-controlled servers. The discovery was made due to its public source code release on the underground hacking…

CYBER NEWS

Over $20 Million Stolen in Ethereum by Hackers from Unsecured Nodes

Cyber-criminals are continuing their “raids” on the blockchain and this time they target Nodes which are exposed and based on the Ethereum blockchain. Researchers by Qihoo 360 have previously discovered a flaw back in March which included using an unsecure…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree