Cyber News - Page 115

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Are Linux Systems No Longer “Safer” from Malware Attacks?

Linux systems have increasingly begun to be targeted by hackers for different reasons. One of those reasons is that most users tend to feel that Linux-based distributions are far more secure than the traditional Windows systems. This is in some…

CYBER NEWS

iWatch Install.php Flaw in Samsung Smartcam Allows Root Access

Another day, another vulnerability! This time the culprit is Samsung Smartcam. The flaw, dubbed iWatch Install.php vulnerability, could allow attackers to gain root access to the device and control it remotely. The iWatch Install.php Samsung Smartcam Vulnerability Explained What is…

CYBER NEWS

Gmail Phishing Attacks 2017: How to Recognize the Scam

Gmail phishing attempts have been registered. Security researchers at Wordfence have detected a highly effective and massively spread phishing technique stealing login credentials for Gmail and other services. Apparently, during the last couple of weeks, tech-savvy users compromised by the…

CYBER NEWS

Scott Schober: Hackers, Like Terrorists, Play on Our Fears

Reading a cybersecurity book may not sound like something entertaining. Scott Schober’s Hacked Again, however, proved that a book covering a very serious topic could be fun to read. Written in a light and easy-to-understand style, the book reveals Mr.…

CYBER NEWS

MJ Freeware Software Platform for Cannabis Targeted by Attackers

Marijuana shops running MJ Freeware software platform for cannabis business are the latest targets of attackers. The activity of marijuana online shops has been disrupted due to attacks against the software used for sales and inventory, Boston Globe reported. Related:…

CYBER NEWS

Beware! Amazon Phishing Scam Lures Victims with Unbeatable Prices

Amazon has once again been targeted by scammers in a smart phishing scam. Crooks are targeting Amazon buyers and are either setting up independent seller accounts or hijacking reputable existing ones. Once this is done, scammers offer expensive items at…

CYBER NEWS

Los Angeles College Paid a $28,000 Ransom and Got the Decryption Key

Paying the ransom only fuels ransomware authors. Many reports proved this claim true but still 2017 starts off with a big ransom being paid by a Los Angeles Valley College. The college’s computer network got hit, and as a result…

CYBER NEWS

Stingray Phone Trackers May Be Changed by Congress

The U.S. Congress has set their sights on stingrays – those devices that stay on top of building and are used to track cell-phone communications, now without even a court approval. With the latest already passed Rule 41’s assistance these…

CYBER NEWS

Paying the Ransom Only Fuels Cybercrime, Report Stats Reveal

Businesses have become a dominant target of ransomware attacks. According to a report by Radware, 49% of businesses have confirmed being the victim of a ransomware operation in 2016. Other 47% percent reported that ransom was the primary incentive of…

CYBER NEWS
software-vulnerability-sensorstechforum

Two Microsoft Edge Bugs Integrated by Sundown EK Authors

Microsoft has been advertising Microsoft Edge as the most secure browser but is this really true? CVE-2016-7200 and CVE-2016-7201 are two vulnerabilities found in the Chakra JavaScript engine in Edge. They were reported last November and fixed by Microsoft. One…

CYBER NEWS

MongoDB Ransomware Attacks Misconfigured Servers

Misconfigured MongoDB databases are the latest targets hence victims of ransomware. Successful attacks against MongoDB have doubled within a single day, researchers say. Servers running MongoDB were first targeted in December 2016, but the scale of the malicious attempts was…

CYBER NEWS

Dr. Roman Yampolskiy: AI Has Tremendous Ability to Help in All Domains of Interest

Dr. Roman Yampolskiy has dedicated his career to the study of artificial intelligence, particularly AI safety. Being a scientist in the field of AI also requires a philosophical understanding of the subject, and Dr. Yampolskiy isn’t afraid to explore. His…

CYBER NEWS

KillDisk Linux Version Demands Huge Ransom, Fails to Provide Decryption

We recently wrote that the KillDisk malware became capable of encrypting data. A newly discovered variant of the malware could act like ransomware to demand money in exchange for decryption. A Linux variant of KillDisk was discovered by ESET researchers.…

CYBER NEWS

Android Tops the 2016 Top 50 Vulnerabilities List with 523 Bugs

CVE Details has released a detailed list of the top 50 products and vendors mostly affected by vulnerabilities in 2016. In terms of products, the compilation is led by Google’s Android, which has reported a total of 523 vulnerabilities. However,…

CYBER NEWS

Ransomware Holidays 2016: Locky and Dridex Delivered to Germans

TrendMicro researchers have observed a spike in spam campaigns running Cerber, Petya, and Locky ransomware. The three crypto viruses are plaguing users in Germany, but the impact of the malicious operators goes beyond borders. Another ransomware operation that has been…

CYBER NEWS

CVE-2015-2419 Leveraged in Latest Sundown Exploit Kit Attacks

Sundown exploit kit was detected in active malvertising campaigns last September. Back then, the exploit kit was delivering the CryLocker ransomware, together with the RIG EK. Unfortunately, security researchers at TrendMicro have discovered that Sundown has been recently updated meaning…

CYBER NEWS

Alice in the ATM Malware Land

Alice is the name of the latest ATM malware family that has been discovered by researchers at TrendMicro. Alice ATM malware is a bit different than other ATM malware pieces – it is not controlled via the numeric pad of…

CYBER NEWS

Crypto Ransomworm, the Ultimate Ransomware Infection of 2017?

Considering the impact of ransomware campaigns, being concerned with the future of the file encrypting menace comes natural. Can it get any worse than it already is? The short answer is yes, it can, and it will. Scott Mills, CTO…

CYBER NEWS

Facebook Bug Reveals Primary Email Address of Any User

A Facebook bug was just discovered by security researcher and bug hunter Tommy DeVoss who got awarded $5,000. The flaw allowed him to view the private email address of any user of the social media. Moreover, the hack made it…

CYBER NEWS

Skype Accounts Hacked Easily Regardless of Microsoft’s Two-Factor Protection

Apparently, Microsoft has been facing some challenges of integrating Skype as users have had their accounts compromised several times already since Microsoft has taken over Skype. The most recent such case is from August, 2016 and it involves the distribution…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree