Cyber News - Page 95

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
Monero Miners image

Double Monero Miners Target Computers Worldwide in an Ongoing Attack

Monero miners are one of the most popular cryptocurrency-related malware that are being distributed in attack campaigns in the last few months. The hacker strategies seem to include them in a lot of different types of infiltration attempts. However the…

CYBER NEWS

Some Phishing Emails Have a Nearly 100 Percent Click Rate

Phishing emails have been successfully fooling employers, tricking them into clicking on the provided links and thus initiating various malicious campaigns. To counter the success of phishing, many companies have started various employee trainings to help them recognize fraudulent attempts…

CYBER NEWS

Consumers Using Mobile Banking Apps at Greater Risk of Financial Loss

Mobile banking apps are a convenience but they also pose a risk to users. A new global research carried out by Avast shows that consumers using mobile banking apps are at a greater risk of falling victim to theft of…

CYBER NEWS

Coldroot macOS RAT and Keylogger Goes Undetected for Years

Coldroot is a remote access Trojan (RAT) that has been distributed on MacOS machines without being detected for quite some time. Researchers say that the malware is cross-platform and that it could successfully drop a keylogger on MacOS prior to…

CYBER NEWS
EU GDPR REGULATIONS IMAGE

What Are the GDPR Regulations and How They Will Affect Internet Users

The GDPR (short for General Data Protection Regulations) rules are about to come in effect in two months time. Our article reveals what do they mean for computer users worldwide and how the regulations will impact the IT industry as…

CYBER NEWS

uTorrent Vulnerability Could Be Exploited by Any Website

One of the most popular BitTorrent apps – uTorrent – has been found to be vulnerable to easily exploited flaws that could allow hackers to perform a variety of malicious actions. More specifically, two versions of the app are vulnerable…

CYBER NEWS
Microsoft Word image

Cryptocurrency Theft Now Possible via Microsoft Word Documents

Security analysts have reported a worrying new discovery — cryptocurrency theft is now possible due to a new feature added in Microsoft Word which allows users to embed multimedia elements. Microsoft have apparently tried to ease the creation of interactive…

CYBER NEWS

Tesla’s Amazon Cloud Hacked in Cryptocurrency Mining Attack

A hack has happened at Tesla – the company’s cloud has been abused to mine cryptocurrency, as reported by RedLock researchers. The report is focused on cloud security. Related Story: How to Steal a Tesla Car, the Android App Edition…

CYBER NEWS

Microsoft Fails to Fix Edge Bug on Time – Google Makes It Public

Google has revealed details about a flaw in Microsoft Edge browser after Microsoft missed the deadline for fixing it. Google had previously notified Microsoft about the vulnerability in the browser via Project Zero, giving them the usual 90-day disclosure deadline.…

CYBER NEWS

Spam in 2017: Cryptocurrency Scams Sneaked in the Inbox

A new report by Kaspersky Lab has revealed the most common type of spam messages that were being delivered in the wild in 2017. Apparently, the share of spam in mail traffic decreased to 56.63 percent, which is 1.68 percent…

CYBER NEWS
Lazarus Group image

Lazarus Group Hackers Are Behind a Dangerous New Phishing Scam

The infamous criminal collective known as the Lazarus Group have been spotted behind a worldwide phishing scam. They are among the most experienced hacker groups that are infamous for coordinating mass attacks against high-end targets. The current campaign is focused…

CYBER NEWS

Microsoft Vulnerabilities Overview: 685 Flaws Reported in 2017 Alone

The number of vulnerabilities in Microsoft products has been growing steadily during the last five years, a new Microsoft Vulnerabilities Report by Avecto reveals. More specifically, in 2013, 325 vulnerabilities were discovered and reported, and currently their number is 685.…

CYBER NEWS

Severe DLL Hijacking Flaw in Skype Won’t Be Patched by Microsoft

As of January, 2018, Skype has been used by approximately 300 million users, according to statistics by Statista. Even though Skype is not the most popular and widely used messenger, its user base still is quite big. So any news…

CYBER NEWS

Zero-Day Flaw in Telegram Exploited to Mine Zcash and Monero

Malicious actors are constantly coming up with new ways of exploiting the various cryptocurrencies available to users. Kaspersky Lab researchers just reported a zero-day flaw discovered in the Telegram Desktop app that could be used as an intermediary for hackers…

CYBER NEWS
Computer Virus Design 2018

Computer Virus Design in 2018: Essential Malware Components

Computer viruses are rapidly evolving as hackers are devising new types of malware and delivery mechanisms. Despite the fact that most ordinary computer users perceive them as single executable files that execute a predefined script behavior, the current attack campaigns…

CYBER NEWS
Cryptocurrency miners image

Cryptocurrency Miners Infect Government Sites Worldwide

Cryptocurrency miners are some of the most dangerous malware that are currently being directed against targets worldwide. Attack campaigns carrying them have the capability of causing much damage to the target hosts. A recent uncovered exploit has led to the…

CYBER NEWS

Blockhain Abuse: Next-Generation Malware Practices

As more and more software developers start to rely on blockchain networks to start their future projects, so are the possibilities to intrude into the devised decentralized infrastructure. Computer hackers are actively seeking ways to weaken the security of the…

CYBER NEWS
Advanced Hacker Tools image

Advanced Hacker Tools — Underground Weapons of Mass Destruction

Computer criminals attempt to cause intrusions and damage networks of high-profile targets and millions of end users daily. However while most attacks rely on simple penetration testing and automated script attacks there are also advanced hacker tools that have the…

CYBER NEWS

Google Chrome Will Mark HTTP Pages As Not Secure

Google just announced that any web page lacking a security certificate (HTTPS) and being served over HTTP is going to be marked as unsecure by the Chrome browser. The change is expected to take place in July this year. HTTP…

CYBER NEWS

Hospitals Are the Latest Target of Cryptocurrency Miners

During the past couple of years, ransomware was preferably targeting medical institutions and hospitals. Multiple health organizations were hit and were left with no choice but to pay the demanded ransom. With the shift of malicious trends to cryptocurrency miners,…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree