Cyber News - Page 101

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Top 6 Advanced Obfuscation Techniques Hiding Malware on Your Device

Increasingly more sophisticated and innovative ways are being developed by cybercriminals to ensure they can break into systems. Here are several obfuscation techniques employed by hackers with ways you can protect yourself from them. Obfuscation is widely used by malware…

CYBER NEWS

Strategic Alliances and Partnerships in Cybersecurity

Strategic alliances and partnerships have been lucrative for the cybersecurity industry. There is a heavy demand for protecting vulnerable data from prying eyes. Industries such as military, entertainment, aerospace have leveled up their security parameters to prevent hackers from making…

CYBER NEWS

The Many Faces of the Jimmy Nukebot Trojan

A new variant of the Jimmy Nukebot banking Trojan has surfaced on the web with a fundamental difference in having shifted its priorities from stealing bank card data to acting as a conduit for downloading malicious payloads for web-injects, crypto…

CYBER NEWS

Onliner Spambot Harvests 711 Million Email Login Credentials

An unprecedentedly massive spambot has managed to compromise the login credentials of over 711 million people worldwide. Onliner Spambot and Why Spam Emails are Anything but a Thing of the Past A security researcher based in Paris and going by…

CYBER NEWS

Sarahah App Uploads Your Contacts List to an Unidentified Server

The widely-used application that has only recently gained popularity amassed over 18 million downloads combined both on Apple and Google online stores. Its legitimacy has come under fire with researchers discovering critical privacy issues within the application. Related Story: NetSarang…

CYBER NEWS

Mobile Carriers Could Be Putting Your Personal Information in Jeopardy

Two-step authentication has become prominent amongst many online service providers. Requiring users to log in using their phone or any other mobile device after supplying their username and password, mobile carriers might inadvertently expose their customers to cybersecurity threats simply…

CYBER NEWS
Washington citywide network compromised ransomware

Washington’s Citywide Network Compromised by a Ransomware Attack

Related Story: Solar Panel Flaw Puts European Power Grids at Risk of Outages The city of Washington became a target in the latest ransomware attack conducted in an effort to compromise the city’s entire network. It is an ominous thought…

CYBER NEWS

WordPress Ransomware Attacks On the Rise (.EV Ransomware)

As of middle of August, researchers have concluded that multiple ransomware variants, starting with EV ransomware have emerged targeting WordPress sites. The viruses aim to lock out the WordPress page, denying access to it and demanding website publishers to pay…

CYBER NEWS

Evolution in the Hardware Encryption Market: Recent Trends and Activities

In today’s world of technology and mobility, cybercrime is prominent and growing fast across the globe. Cybercrime poses a real danger to organizations, government, and financial institutions. Given the rising number of cyber-attacks and other modes of theft, there is…

CYBER NEWS

The 10 Funniest Computer Fails, Bugs and Errors

As long as there is code, there will always be bugs in it, and this is definitely not a good thing, especially for companies, because such minor bugs may result in devastating consequences. However, bugs and errors can sometimes amuse…

CYBER NEWS

The Best Hacker Gadgets (Devices) for 2020

This article is created to show you what are the most desired and effective hacking gadgets in 2020 and what makes them so special and sought after. SIDENOTE: This post was originally published in August 2017. But we gave it…

CYBER NEWS

Intel’s 8th-Gen Kaby Lake CPU Offers 40 Percent Performance Boost

Intel has officially released the details surrounding its long-anticipated 8th generation core chips that are bound to turn thin laptops into quad-core powerhouses. Not very often do you get Intel to announce the launching of a new Kaby Lake R…

CYBER NEWS
Replacement touchscreens and malware image

Replacement Touchscreens Can Infect Smartphones with Malware

Computer security researchers from the Ben-Gurion University of the Negev report a new malware attack via replacement touchscreens. The experts report that it is possible for criminals to abuse repair services and embed malicious code using this technique. Related Story:…

CYBER NEWS
EngineBox malware image

EngineBox Malware Used in Attacks on Financial Institutions

Security researchers uncovered that a series of ongoing attacks using the EngineBox malware are targeting financial institutions in Brazil. The hackers use malicious spam messages to fool the companies into infecting their hosts with the dangerous threat. Related Story: Internal…

CYBER NEWS

Apple Macs Compromised by Rudimentary Mugthesec Adware

Potentially unwanted programs (PUPs) have been on the rise with Macs in the last few years. The annoying PUPs can be a pretty daunting and at points exacerbating experience. Software as such will not cease to remind you your device…

CYBER NEWS
SyncCrypt ransomware image

SyncCrypt Ransomware Spreads Via Worldwide Spam Wave

The SyncCrypt ransomware is a newly identified threat that is now being distributed in a worldwide spam attack wave. The hackers behind the threat coordinate template-based email messages that include payload files that lead to the dangerous infection. SyncCrypt Ransomware…

CYBER NEWS
MIcrosoft Office CVE-2017-0199 Exploit

Hackers Devise Microsoft Office Infections via CVE-2017-0199 Exploit

Computer hackers are now attempting to infect computers worldwide using a new method that employs the CVE-2017-0199 exploit. The attackers have devised a new method that abuses a function found in in the new releases of Microsoft Office. Related Story:…

CYBER NEWS

New ‘Pulse Wave’ DDoS Attack Scheme Discovered

Previous servers thought to be secure have been discovered to expose certain vulnerabilities in DDoS mitigation solutions caused by a newly discovered method of carrying out DDoS attacks going by the name of ‘Pulse Wave.’ Discovered by Imperva Incapsula, a…

CYBER NEWS
Disdain Exploit Kit

Disdain Exploit Kit Is the Newest Hacker Toy

The Disdain Exploit Kit is a hacking utility that has recently been identified on the black markets possibly being a modified version of an older threat. It is available in several versions depending on the rent and the price is…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree