Cyber News - Page 87

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

The Typeframe Virus is North Korea’s Newest Cyberweapon

A new dangerous threat dubbed the Typeframe virus has been found to originate from North Korea. This was reported by the US DHS (Department of Homeland Security), the investigation shows that it is a very potent threat. New North Korean…

CYBER NEWS
DNS Amplifications Attacks

Reports Indicate Growth of DNS Amplification Attacks In Q1 2018

A security report reveals that the number of DNS Amplification attacks done in the first quarter (Q1) of 2018 have doubled. By definition they are a type of DDOS (Distributed denial of service) attacks which are among the most common…

CYBER NEWS

DockerHub Miner Virus – Malicious Images Downloaded 5 Million Times

The cyber-criminals have gotten lucky again and have managed to make around 90 thousand dollars as a result of spreading 17 malicious images via the website Docker Hub. The website administrators were able to delete the malicious images after 8…

CYBER NEWS
MirageFox image

MirageFox Malware: the Latest Addition to APT15 Hack Arsenal

The APT15 hacking group which became well-known for its high profile attacks against US Military has developed a new dangerous malware tool called MirageFox. It is believed that it is an updated version of previously-released threats. A detailed technical analysis…

CYBER NEWS
SigSpoof PGP bug image

CVE-2018-12020: SigSpoof PGP Bug Allows Hackers to Spoof Signatures

The SigSpoof PGP Bug has been discovered to be a decade-old threat that allows hackers to spoof any user’s signatures and identity. This is a rare instance where a security issue has been available for many years and the vulnerability…

CYBER NEWS

Has Tether Been Used to Manipulate Bitcoin’s Value Boost?

According to two researchers from University of Texas, there is a particular reason that blew the price of Bitcoin out of proportion last year. Professor John Griffin and graduate student Amin Shams believe that Bitcoin’s value boost was due to…

CYBER NEWS
Microsoft logo image

Here’s Why Microsoft Leaves Some Vulnerabilities Unpatched

Microsoft has revealed their plans for patching exploits and how they are being handled by their security team. The details are outlined in a draft that reveals how the Microsoft Security Response Center will react according to the different severity…

CYBER NEWS
MysteryBot Android Trojan image sensorstechforum com image

Android Users Beware: MysteryBot Trojan Can Encrypt Your Files

Security researchers have spotted another dangerous threat that is being targeted at mobile users. The MysteryBot Android Trojan is the latest offensive tactic against mobile devices as it is being launched on a global scale. It is rated as a…

CYBER NEWS

CVE-2018-3665 Vulnerability Found in Intel Core and Xeon Processors

Yet another chip vulnerability has been discovered, CVE-2018-3665, which has been called Floating Point Lazy State Save/Restore. The flaw resides in Intel Core and Xeon processors, and is similar to Spectre since it is a speculative execution flaw. Related Story:…

CYBER NEWS
Amazon Fire

Amazon Fire TV and Fire TV Stick Miner Infections on the Rise

Following the large number of viruses that are being developed for Android and iOS devices we have received reports that a large number of Amazon Fire TV and Fire TV Stick devices are being targeted by cryptocurrency miners. The hackers…

CYBER NEWS

Malicious Code Can Look Like It Has Been Signed by Apple

Security researchers just discovered a code-signing bypass vulnerability that allows malicious code to masquerade as an official Apply system file. In other words, some of the implementations of Apple’s official code-signing API can be exploited by hackers. Apple has made…

CYBER NEWS

KB4284835 Update: Windows 10 Build 1803 Patched to Version 17134.112

Microsoft has released the latest Windows patch bulletin in the KB4284835 update. This updates Windows 10 from build 1803 to OS build 17134.112. This fixes a total of 50 security patches and brings other improvements to the software. KB4284835 Updates…

CYBER NEWS

Dixons Carphone Data Breach Exposes 5.9 Million Payment Cards

According to a statement made by the company, European electronics giant Dixons Carphone has suffered a serious data breach, or what it appears to be, two separate data breaches. Dixons Carphone Official Statement on the Data Breach As part of…

CYBER NEWS

Yahoo Receives £250,000 Fine for 515,121 UK Accounts Hacked

News have broken out regarding another fine in the size of £250,000 for Yahoo because of a delayed data leak disclosure which happened back in 2014. The breach has resulted in the successful theft of a total of 515,121 users,…

CYBER NEWS
Apple image

Apple Bans Cryptocurrency Miners from the App Store

Apple has started restricting the inclusion of cryptocurrency miners from its App Store. The company is doing this in the hope of protecting computer users from malicious instances. The majority of miner code available on these software repositories may be…

CYBER NEWS

$1.1 Billion in Cryptocurrency Theft Since December 2017

According to many experts in the cybersecurity field and to statistics as well, Bitcoin is no longer be the most preferable cryptocurrency used by cybercriminals in their operations. Bitcoin’s high profile and lack of complete anonymity has made cybercriminals turn…

CYBER NEWS
Google Chrome extensions

Google Chrome Will Block Third-Party Site Extensions Installation

Forthcoming versions of the Google Chrome browser will block the installation of extensions outside of the Chrome Web Store. This was announced by the company in an official blog post yesterday. The step is being made in order to protect…

CYBER NEWS

Three Vulnerabilities Found in Foscam IP Cameras (CVE-2018-6830)

Three vulnerabilities have been found in Foscam security cameras. Owners of such cameras are urged to update as soon as possible. The flaws are described as an arbitrary file-deletion bug, a shell command-injection bug and a stack-based buffer oferflow vulnerability.…

CYBER NEWS

.men, .gdn, .work – the Most Abused Top-Level Domains in 2018

Security researcher Brian Krebs has revealed some interesting details in terms of some of the riskiest domains on the Internet. Apparently, websites ending with some of the latest TLDs (top-level domains) such as .men, .work and .click are considered highly…

CYBER NEWS

250,000 Euros Fine for French Company that Exposed Customer Data

A fine in the size of 250,000 euro has been imposed on Optical Center, a French company specialized in selling eye and hearing aids. Apparently, the company has failed to secure the data of its customers on its website, and…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree