Cyber News - Page 117

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
android-bug-stforum

CVE-2016-5195, Plenty of Flaws Fixed in Android’s December Bulletin

Dirty Cow may sound like someone’s favorite insult but it’s actually Google’s latest Android vulnerability addressed in the corresponding security update. This particular fix comes along with 49 flaws, 11 of which are rated critical fixes. Related: Do You Need…

CYBER NEWS
hacker-stforum

Were Russian Banks Just Targeted by Foreign Intelligence Service?

Russia has just said that it succeeded to block a major cyber attack targeting the country’s financial system, more precisely the largest Russian banks. The attack most likely has been started by an unnamed foreign intelligence service. The FSB has…

CYBER NEWS
raef-bio-sensorstechforum2

Raef Meeuwisse: Criminals Share Information Better and Faster than Legitimate Organizations

Raef Meeuwisse is a passionate information security expert who has written several books, covering the most pressing cybersecurity topics: The Encrypted Book of Passwords; The Cybersecurity to English Dictionary; Cybersecurity: Home and Small Business; Cybersecurity for Beginners; Cybersecurity Exposed: The…

CYBER NEWS
hacker

Avalanche Cybercrime Network Will No More Plague Users

Avalanche, the major cybercriminal network that has plagued thousands of users, has finally been dismantled. Numbers show that the network infected at least 500,000 systems daily, and has successfully delivered phishing emails to potential victims. The group has been active…

CYBER NEWS
firefox-edge-theme-stforum

Mozilla Firefox Goes Microsoft Edge

You’re perhaps reading this because you’re a Windows 10 user. As such, you are most likely using the Microsoft Edge browser despite previously favoring Chrome and Firefox. The truth is that in spite of its rough start, Edge is gaining…

CYBER NEWS
malware-header-stforum

The Resurrection of Shamoon Wiper Malware

The upcoming winter holidays bright forth not only new cyber threats but also old malware pieces. That’s exactly the case with Shamoon malware which has apparently returned to the malware scene after a four year vacation. Reports from security companies…

CYBER NEWS
iphone-apple

How to Bypass Apple’s iOS Activation Lock on iPhone and iPad

The myth that Apple devices are invincible to hacking is slowly starting to fade away to reality. And the reality is that Apple, just like every other tech giant, can’t keep up with the “dark side” of technology. It’s now…

CYBER NEWS
shutterstock_385561282

Linux Security Basics: What System Administrators Need to Know

Every new Linux system administrator needs to learn a few core concepts before delving into the operating system and its applications. This short guide gives a summary of some of the essential security measures that every root user must know.…

CYBER NEWS
mirai-botnet-malware-attack-worm-sensorstechforum-germany-devices

Mirai Botnet Takes Down Over 900K IoT Devices In Germany

What appears to be the biggest botnet so far – Mirai has created yet another menace, this time for the German company, Deutsche Telekom. The botnet has managed to login to the admin panel of most broadband routers, affecting the…

CYBER NEWS
info_2_revised-11-23-16-copy

Gooligan Android Malware Endangers One Million Google Accounts

A new very dangerous malicious campaign was just discovered by researchers at Check Point. The attack campaign is dubbed Gooligan and succeeded to breach the security of more than one million Google accounts. Researchers say that this huge number continues…

CYBER NEWS
watch-dogs-ubisoft

Predictive World by Ubisoft Uses Big Facebook Data to Tell You Who You Are

Big Data is changing our lives every day, no matter if we realize it or not. There are certain projects, however, that perfectly depict what Big Data is capable of. A quite peculiar project was just launched, curiously dubbed Predictive…

CYBER NEWS
which-is-the-most-secure-mobile-os-sensorstechforum

Which Is The Most Secure Mobile OS in 2016

Since there is an awful lot of noise going around regarding which phone is better and why should we buy this brand versus that brand, we have decided to take a look at the situation from OS security perspective. Yes,…

CYBER NEWS
help-sensorstechforum

KB3200970 Has Caused Issues on Lenovo Devices, Microsoft Admits

Were you one of the users having troubles with the cumulative update KB3200970? The update is part of this month’s Patch Tuesday, and Lenovo users, particularly, were experiencing issues with it. Microsoft has finally explained why. In a November 24…

CYBER NEWS
trojan

Dridex Spread via Compromised OneDrive for Business Accounts

Forcepoint researchers have disclosed a new current of attacks that involve Microsoft’s OneDrive for Business. Cybercriminals are hosting malware on the service to attack links in emails that are then sent to users. The researchers say that: (…) cybercriminals have…

CYBER NEWS
tesla-car-android-app-stealing-tesla

How to Steal a Tesla Car, the Android App Edition

An Android app is enough to locate, unlock, and steal a Tesla car. This is what researchers at Promon succeeded to prove just by using a single application. Our researchers have demonstrated that because of lack of security in the…

CYBER NEWS
windows-xp

Old Computers Make Users Drink and Shout, Microsoft Survey Says

Microsoft has carried out a survey in the UK to outline the reasons which frustrate Windows users the most. Not surprisingly, the age of computers turned out to be the number one frustration and cause of issues. The survey also…

CYBER NEWS

2016 Trends in Ransomware

Ransomware is not a new phenomenon, yet it remains one of the most popular forms of cybercrime due to the ease of its distribution and the good profits it provides to criminals. One of the reasons for the proliferation of…

CYBER NEWS
technology-music-sound-things

Speak(a)r Proof-of-Concept Malware Turns Headphones into Spies

All our devices could turn into a gateway for spying, even our headphones. Israeli security researchers at Ben Gurion University recently discovered a way to turn headphones into microphones to use them to record audio. In other words, your headphones…

CYBER NEWS
shutterstock_223094779

Millions Stolen via ATM Malware Rigged to Make Machines Drop Cash

Hacking group with long history in banking attacks has been reported to cause infections to ATM machines, allowing them to rig the machines to directly spit cash on the street. All the crooks had to do is stay in front…

CYBER NEWS

SQL Injection Enough to Hack a Government Website

SQL injection is enough to hack the Hungarian Human Rights Foundation. This is exactly what security pentester Kapustkiy did, together with CyberZeist. The two got access to more than 20,000 accounts and personal information such as phone numbers and home…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree