Cyber News - Page 103

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Internal Networks Affected By Self-Propagating Emotet Trojan

Researchers have discovered a new variant of the Emotet Trojan. The variant is said to utilize features that can aid the malware to propagate over internal networks. Update November 2017: The Emotet banking Trojan has been updated to include a…

CYBER NEWS
SonicSpy Android Spyware image

SonicSpy Android Spyware Generates over 1000 Apps

Security experts identified that the SonicSpy Android Spyware is being used to generate a lot of malicious apps for the mobile operating system. In several months time the hackers have been able to create over 1000 virus instances, some of…

CYBER NEWS

The Most Notorious Linux Bugs and Vulnerabilities (Exploits)

Usually the Linux-kernel distributions are all made to be secure by design. But as long as there is code, there will be bugs and most Linux distributions are notorious for the numerous bugs that they have had over the years.…

CYBER NEWS
Magnitude Exploit kit Attacks With Cerber ransomware image

Magnitude Exploit Kit Used for Cerber Ransomware Hacker Attacks

Cyber security researchers identified that the Magnitude exploit kit is being used to spread Cerber ransomware samples worldwide. The hackers behind the large-scale campaign are using a different strategy with the hope of increasing the infection ratio. Cerber Ransomware Hacker…

CYBER NEWS
Mamba ransomware featured image

Large-Scale Mamba Ransomware Attacks on the Rise Again

The notorious Mamba ransomware that paralyzed the the San Francisco Municipal Transportation Agency back in 2016 has resurfaced. This time the criminals behind the the large-scale attacks have refocused their attention on corporations around the world. Mamba Ransomware Reactivated Once…

CYBER NEWS

Top 5 Future Cyberattacks Already Happening Now

Many of us are aware in one way or another of the nasty nature of online threats, the results of devastating cyberattacks on governments, businesses and you, the private citizen. What most people do not know is that, in the…

CYBER NEWS
Linux Security Questions image

Top 15 Linux Security Questions You Didn’t Know You Had

Beginner Linux administrators and users should know that even though the operating system is deemed secure, there are many pitfalls and details to consider. Linux security may be there by default but the various distributions may opt to enable certain…

CYBER NEWS

GPS Cybersecurity Flaws Endanger Shipping Industry

GPS may have killed the old-fashioned World War II radio navigation, but a more sophisticated and advanced version is set to make a return amid fears of GPS cybersecurity flaws that can be exploited by hackers. Evolution of GPS Navigation…

CYBER NEWS

Solar Panel Flaw Puts European Power Grids at Risk of Outages

A Dutch security researcher has found a menacing vulnerability in essential component within solar panels dispersed across Europe that if exploited, could cause serious widespread power outages in European power grids. Solar Panel Flaw Found in the Inverter Converting Direct…

CYBER NEWS

Invisible Man Android Trojan Targets Users of Banking Apps

A newly discovered Android malware is targeting banking apps to gain access to users’ bank accounts. Background Information of Banker.AndroidOS.Svpeng.ae a.k.a. Invisible Man Adobe Flash, the harbinger of video on the internet, has been immensely instrumental in its role of…

CYBER NEWS

CVE-2017-7533 – Severe Linux Kernel Vulnerability

CVE-2017-7533 is the identification of the latest vulnerability found in Linux kernel that was disclosed on August 3. The flaw is described as a “race condition” that can be exploited to allow an unprivileged local user to obtain root access…

CYBER NEWS
WannaCry global ransomware infections image

WannaCry August Update ‒ Ransom Sums Collected and Slayer Arrested

The security community reported two major incidents connected to the infamous WannaCry ransomware that hit computers worldwide about a month ago. The operators behind it have managed to collect the ransom sums. At the same time the expert who shut…

CYBER NEWS

Rurktar Malware Discovered – Spying Tool Under Development

Security researchers uncovered the Rurktar Malware family, a compendium of several virus strains that are currently being developed. As the security analysis is still ongoing we expect to see hacker attacks using the Rurktar malware in the coming weeks. Rurktar…

CYBER NEWS
Stantinko Malware image

In-Depth Analysis of the Stantinko Malware – How to Protect Yourself

The infamous Stantinko malware family has turned out to be a menace to European countries. Computer hackers are using the dangerous virus to infect computers on a mass scale. According to the latest data about 4 million computers in Moscow…

CYBER NEWS
SLocker Android Ransomware Image

SLocker Android Ransomware – In-Depth Analysis and Prevention Tips

Security engineers discovered that the SLocker Android ransomware family code base has been published in a decompiled (raw) form. This allows every hacker This is a prominent threat that has produced many strains ever since its first iteration. SLocker Android…

CYBER NEWS

JS_PLOWMET Fileless Windows Malware Leaves No Trace of Intrusion

As cybercriminals become progressively sophisticated and innovative in their criminal endeavours, the new fileless JS_PLOWMET malware makes it increasingly difficult for security experts to trace and locate the malware when an intrusion occurs. The malware is reported to leave no…

CYBER NEWS
IP Cameras image

Popular IP Cameras Vulnerable to Hacker IoT Attacks

Security vendors discovered that popular IP Cameras are vulnerable to dangerous remote exploits and IoT hacker attacks that can result in device abuse. Related Story: Persirai IoT Malware Exploits CVE-2017-8224, Known Vulnerabilities Ip Cameras Once Again Threatened By a Lack…

CYBER NEWS

Hackers Could Hijack and Exploit Carwash Systems via Critical Flaw

A group of security researchers have discovered a critical flaw within automatic carwash systems that are connected to the Internet. The vulnerability could potentially be exploited by remotely hijacking the carwash and directly pose a risk to the health and…

CYBER NEWS
Amazon Echo image

Amazon Echo Malware Can Spy оn Users аt All Times

Security experts demonstrated that an Amazon Echo malware can be used to institute a 24/7 surveillance mode onto the victims by accessing the device’ hardware. Related Story: Cortana Is Not Your Friend but Your Enemy, and Here’s Why Amazon Echo…

CYBER NEWS

Pre-Installed Android.Triada.231 Trojan Shipped with Chinese Devices

Security researchers have stumbled upon pre-installed malware and spyware on devices many times. Unfortunately, there’s new malware of the pre-installed kind that was just discovered by security company Dr. Web. The malware, which in fact is a Trojan horse called…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree