Cyber News - Page 112

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Chrome 56 Update Issue Doesn’t Stem from Google but from BlueCoat

Problems were reported with Google Chrome’s latest update. More particularly, Chromebook users were unable to reach the Internet. Chromebooks are primarily used in schools where the connection is protected by proxies like Symantec’s BlueCoat. In fact, the issue with the…

REVIEWS

Connected CloudPets Toys Expose Two Million Children Voice Recordings

How about that? 2 million voice recordings of children and parents, together with e-mail addresses and passwords belonging to 800,000 accounts have been exposed. The reason? Insecure Internet-connected stuffed animal toys! Voice Recordings and Sensitive Data from Connected CloudPets Toys…

CYBER NEWS

Google’s ProjectZero Puzzled by Microsoft, CVE-2017-0037 Still Not Patched

Google’s Project Zero reported to Microsoft a security bug in Edge and Internet Explorer 11 on November 25th, 2016, which still hasn’t been patched. The vulnerability, identified as CVE-2017-0037, would allow remote code execution where attackers could crash browsers and…

CYBER NEWS

E2EMail by Google Goes Open-Source as a GitHub Repository

E2EMail, an experimental end-to-end encryption system developed by Google, was just made available for open-source usage. “E2EMail is not a Google product, it’s now a fully community-driven open source project, to which passionate security engineers from across the industry have…

CYBER NEWS

CVE-2017-6206 Found in D-Link DGS-1510 Enterprise Switch Kit

In January 2017 the Federal Trade Commission started suing the Taiwanese router production company D-Link because of vulnerabilities in their Wi-Fi routing devices and web cameras. Those vulnerabilities could allow attackers to exploit the devices. Almost two months later, security…

CYBER NEWS

Adwind RAT Is Back on Track, Compromising Global Businesses

After it was rebranded in 2016, Adwind, the famous remote access tool has been put to use once again. Attacks on more than 1,500 organizations have been reported, and at least 100 countries have been compromised, Kaspersky Lab report reveals.…

CYBER NEWS

CS:GO Lobby Hackers Still Remain a Mystery

Hackers have been detected earlier this month to join almost every lobby in one of the biggest online competitive games out there – Counter Strike:Global Offensive. The hackers did not have any specific need, but a simple message they had…

CYBER NEWS

Proxy Module in Necurs Botnet Could Lead to DDoS Attacks

The last time we wrote about the Necurs botnet was in January, when it was used in Locky ransomware distribution operations. Necurs has been primarily used to spread spam emails in order to infect user systems. The botnet usually infected…

CYBER NEWS

Spora Ransomware Chat Support: A Fascinating Read

F-Secure, the Finnish web security company, recently released a 34-page transcript from a group chat that belonged to the creators of Spora ransomware family. Spora is a ransomware virus, primarily targeting Russian speakers as evident by its payment page and…

CYBER NEWS

U.S. Survey Reveals Troublesome Details About Medical Data Breaches

Data breaches that affect the healthcare sector are a huge privacy and security disaster. As Dr. Mansur Hasib told us in an interview, the worst breach in healthcare so far was at Anthem (the Anthem medical data breach that took…

CYBER NEWS

Chrome Users Targeted by “font wasn’t found” Scam

Do you use Chrome? Be alert as a new scam has been reported to target users. The scam has been dubbed “font wasn’t found” and was discovered by Mahmoud Al-Qudsi from NeoSmart Technologies. It has most likely originated from WordPress…

CYBER NEWS

Who Stole Our Money in 2016? Most Popular Financial Malware

2016 has seen several powerful financial cybercriminal groups specifically targeting large and financially sound organizations. Multiple banks, payment processing systems, hotels, retailers and plenty of other businesses relying on PoS payments were brutally targeted. Details about such attacks were just…

CYBER NEWS

How Russian Criminals Boost Ransomware Growth

It may come to no one’s surprise that the current ransomware ecosystem is being created and maintained mainly by Russian-speaking cyber criminals. Kaspersky’s research showed that 80% of all crypto-ransomware families originated from Russian underground forums and other similar sources…

CYBER NEWS

123 Cybercriminals Sought by the FBI Globally

The FBI is currently seeking 123 alleged cybercriminals globally, as reported by ITNews. The criminals should face charges before the US court. During the RSA Conference, Steven Kelly, international cybercrime coordination cell (IC4) unit chief, said that the number of…

CYBER NEWS

Remcos RAT v1.3.7 Making Rounds in the Wild, Researchers Say

It’s been a while since we last wrote about RAT-related attacks. However, this is about to change as а new RAT, Remcos, has been detected being sold on underground forums. First noticed in the second half of 2016, the malicious…

CYBER NEWS

The Yahoo Saga Continues: User Accounts Accessed Via Cookies

The Yahoo saga continues, as the company has again started notifying users of more malicious activities involving more user accounts. Apparently, attackers may have accessed user accounts via fake cookies instead of passwords. Unfortunately, the number of accounts accessed this…

CYBER NEWS

Self-Healing Malware Discovered, Magento Websites Attacked

Magento has been targeted once again by new malware that is capable of self-healing. This process is possible thanks to hidden code in the targeted website’s database. The researcher who came across the new malware pattern is Jeroen Boersma. However,…

CYBER NEWS

The Human Operating System Key Role in Data Breaches

The human operating system continues to be the key role in cybersecurity incidents and data breaches, as revealed by Data Breach Digest by Verizon: Data breaches are complex affairs often involving some combination of human factors, hardware devices, exploited configurations…

CYBER NEWS

Dr. Mansur Hasib: Cybersecurity Is People Powered Perpetual Innovation

Dr. Mansur Hasib has been helping executives transform their organizations through digital leadership and cybersecurity strategy in healthcare, biotechnology, education, and energy. Dr. Hasib is a Doctor of Science in Cybersecurity (IA), and holds the prestigious CISSP, PMP, and CPHIMS…

CYBER NEWS

Watering Hole Attacks 2017: Banks Compromised with Downloader.Ratankba

Quite a few banks have been targeted in the so-called watering hole attacks. The attacks from January against Polish institutions where a booby-trapped site of the Polish Financial Supervision Authority was used were just the beginning of a series of…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree