Cyber News - Page 98

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

RubyMiner Malware – How to Detect and Remove It from Your Computer

This article has been created in order to explain what is the RubyMiner malware threat and how to remove it from your computer. New cryptocurrency miner, known as RubyMiner has been detected by malware researchers. The virus aims to mine…

CYBER NEWS

Data Security Tips and Pitfalls to Know About in 2018

In 2017 we saw international corporations, public figures, and individuals alike become the victims of major data security breaches. Most prominently, perhaps, was the leaking of nearly 150 million American’s social security numbers by Equifax. There were also major breaches…

CYBER NEWS

BlackWallet App Compromised, 400,000 USD In Lumens Stolen

The BlackWallet browser-based wallet application has been compromised and 400,000 USD in user funds (in the Stellar Lumen cryptocurrency) were stolen from it. It’s still unknown who is behind this attack. To perform the attacks, hackers hijacked the DNS servers…

CYBER NEWS

Malware Trends 2018: How Is the Threat Landscape Shaping?

2018 is already here, and it has started pretty strong for cybersecurity with the disclosure of the Meltdown and Spectre vulnerabilities. However, the question still remains – what will this year bring in terms of malware coding, attacks on enterprises…

CYBER NEWS
WhatsApp and Signal security image

WhatsApp and Signal Bugs Expose Encrypted Group Chats

A dangerous security bug has been identified in the popular WhatsApp and Signal messenger aps that allows hackers to covertly gain access to encrypted group chats. The experts that discovered the exploit reveals that the problem lies in the intermediate…

CYBER NEWS

Hackers Are Getting Smarter – But What Can You Do About It?

The image of a hacker as some manchild in his mom’s basement is a thing of the past. Today’s criminals are smarter, savvier, and more professional than ever. How can you defend against them? 73% of Americans have at some…

CYBER NEWS

RIG EK Currently Delivering Monero Miner to Unsuspecting Users

Until recently, exploit kits were mostly deployed to distribute ransomware. However, following the current trend in worldwide infections, cybercriminals have started using exploit kits for the distribution of cryptocurrency miners. Exploit Kits and Drive-By Downloads Actively Used in the Distribution…

CYBER NEWS
Turla hackers image

Turla Hackers Employ Mosquite Backdoor Against Diplomats

The Turla Hackers are a famous criminal collective that are widely known for executing complex attacks against large companies and government institutions. Security experts have detected that they are responsible for a large-scale ongoing hacking campaign against embassies and consulates…

CYBER NEWS
Monero CryptoCurrency Miner image

Monero Cryptocurrency Miner Generates Profit for North Korea

Security researchers discovered that a recently released Monero cryptocurrency miner sends out the generated income to the Kim Il Sung University in North Korea. An in-depth code analysis reveals that it can be updated to include additional components as well.…

CYBER NEWS

Windows Gets No Security Patches Unless AV Programs Set a Registry Key

Microsoft just made an important announcement on their support page regarding incompatibilities between antivirus programs and the Windows patches for Meltdown and Spectre. Microsoft identifies compatibility issue in how some AV programs handle the Meltdown and Spectre updates for Windows…

CYBER NEWS
WaterMiner Monero Miner

PyCryptoMiner Targets Linux Machines to Mine for Monero

A Linux-based Monero miner botnet, which has been dubbed PyCryptoMiner has been discovered by security researchers. The botnet which is based on a cryptocurrency miner has earned cybercriminals at least 158 Monero which amounts to $63,000. PyCryptoMiner has been written…

CYBER NEWS

KB4056892 – Emergency Windows 10 Update to Address Processor Flaws

The 2018 year started with some pretty major exploit discoveries. Named Meltdown and Spectre, these exploits are perhaps the most dangerous processor flaws that affect almost all modern processors. The security vulnerabilities affect whole generations of computers and devices of…

CYBER NEWS
Meltdown and Spectre Exploits image

Meltdown and Spectre Exploits Endanger Generations of Computers

Security researchers discovered one of the most dangerous processor flaws called Meltdown and Spectre that affect almost all modern processors. The security vulnerabilities affect whole generations of computers and devices of all types that use the quoted chips. As a…

CYBER NEWS

Trackmageddon: GPS Location Tracking Service Making You Hackable

There is hardly a day without any privacy-related incident, data breach or vulnerability disclosure. It turns out that even many of the GPS services we use on a daily basis are full of multiple vulnerabilities. These vulnerabilities, dubbed Trackmageddon could…

CYBER NEWS

Why Cybercriminals Are Ditching Bitcoin for Altcoins

There is Bitcoin, and then there are the altcoins, the alternative cryptocurrencies created after the success of Bitcoin. According to many experts in the cybersecurity field, Bitcoin may no longer be the most preferable cryptocurrency used by cybercriminals in their…

CYBER NEWS

CVE-2017-1000499 in phpMyAdmin Could Lead to XSRF Attacks

phpMyAdmin, one of the most widely used applications for managing the MySQL database, has been found to contain a serious security flaw. The vulnerability could grant remote access to attackers allowing them to carry out dubious database operations by luring…

CYBER NEWS

Tracking Scripts Exploit Browsers’ Built-In Password Managers

Modern advertising techniques are often borderline malicious, especially when it comes to the ways marketing companies gather users’ personal information. A team of researchers from Princeton’s Center for Information Technology Policy just discovered that at least two marketing companies are…

CYBER NEWS

15-Year-Old macOS Bug in IOHIDFamily Leads to Full System Compromise

2018 is here and it’s already delivering some quite nasty vulnerabilities. A security researcher known as Siguza has just released detailed information on an unpatched zero-day flaw in macOS, which could lead to an attacker gaining root access on a…

CYBER NEWS

Online Security for Seniors: Identity Theft, Financial Fraud

More and more of our moms and dads are going online. A 2017 report from the Pew Research Center found that 67% of adults aged 65 and over said that they used the internet. Seniors are accessing the internet in…

CYBER NEWS

Nissan Canada Data Breach Affects Various Customer Data

The end of the year is approaching but cybercriminals know no rest. Another data breach has been detected, affecting Nissan. The company has notified that a possible data breach has happened, affecting their customers’ personal information. More specifically, the breach…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree