Cyber News - Page 118

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
android-malware-stforum

Android Firmware Acts Like Backdoor, Secretly Transmits PII to a Chinese Company

Mobile application security company Kryptowire has just disclosed a pre-installed backdoor on more than 700 Android devices. The backdoor transmits data to a server in China every 72 hours. The firmware could target specific users and text messages matching remotely…

CYBER NEWS
geekedin-front-page

8 Million GitHub Profiles Exposed Due to Vulnerability in Another Service

Troy Hunt has released information about yet another data leak affecting more than 8 million GitHub profiles. The security researcher, however, made sure to highlight that the leak isn’t a result of a vulnerability found on GitHub: (…)This incident is…

CYBER NEWS
the_eye_of_sauron_by_stirzocular-d86f0oo

Is UK’s Snoopers’ Charter Becoming an All-Seeing Eye?

Is the UK government becoming the all-seeing eye? Image Source: Stirzocular/Deviantart Internet privacy definitely has a butterfly effect feeling to it. Or maybe the term ‘privacy’ is totally misused, as in most cases people are dealing with the lack of…

CYBER NEWS
scam-in-a-box-stforum-1

Scam in a Box Packages Broaden the World of Online Ploys to Low-Skilled Criminals

Nothing embodies the evolution of digital crime quite like crimeware-as-a-service. Years ago, bad actors preyed upon unsuspecting users by relying mainly on their technical acumen. Sure, they could share their techniques on IRC forums, but it was ultimately up to…

CYBER NEWS
poisontap

$5 PoisonTap Hack Tool Hijacks All Web Traffic, Installs a Backdoor

The exploit tool arsenal just got bigger. Meet PoisonTap, a tool created by the infamous Samy Kamkar. PoisonTap is designed to run freely available software on a $5 Raspeberry Pi Zero device. But how does it work? The tiny tool…

CYBER NEWS
eye

Australia’s Facial Verification System Will Fight Identity Crime

Australia’s facial verification system (FVS) which was announced in 2015 is already up and running. The first three agencies to have access are the Department of Foreign Affairs and Trade (DFAT), the Australian Federal Police (AFP), and the Department of…

CYBER NEWS
pexels-photo

Human Factors Lead to Network Outages, and This Survey Proves It

The human operating system is culpable for a prevalent amount of network outages, a new global study finds. Conducted by Dimensional Research, the study (called “Network Complexity, Change, and Human Factors Are Failing the Business”) surveyed 315 network professionals regarding…

CYBER NEWS
chrome-battery-sensorstechforum

Researchers Raising Concerns over Microsoft Competitiveness and Interference

Many malware researchers with extensive experience remember that Microsoft was a huge leader In cyber-security policy, because it made efforts to fix multiple vulnerabilities in it’s code and work with the security community constantly. However, the situation has now changed…

CYBER NEWS
risk-security-stforum

Recruitment Firm Michael Page Joins the Data Breach Family

Another major data breach has been disclosed by Troy Hunt. In his words, the breach at global recruitment firm Michael Page has a lot in common with the Australian Red Cross incident. More particularly: It was the same individual who…

CYBER NEWS
are_you_kidding_me

Most Ludicrous Ransomware

Ransomware is today’s most hated computer virus. However, the destructiveness of each ransomware depends on its roots. Is it part of an active, highly successful ransomware family periodically releasing new versions? Or is it one of those oddly “shaped” viruses…

CYBER NEWS
shutterstock_278999798

Tesco Bank Hack Results in 20,000 Accounts Affected

The British institution Tesco Bank has seen a major breach on the bank accounts of approximately 20 000 of their customers. What is worse is that this was an online robbery attempt on the accounts and even though the bank…

CYBER NEWS
vulnerability-stforum

CVE-2016-7255, 67 Vulnerabilities Addressed by Microsoft

The latest 14 security bulletins by Microsoft have patched 60 vulnerabilities in Windows OS, Office, Edge and Internet Explorer browsers, and SQL servers. One of the bulletins addresses flaws in Adobe Flash Player upgraded via Windows Update in Windows 10…

CYBER NEWS
android-trojan-spylocker

Banking Trojans for Android Infect Over 200,000 Users

Researchers have reported that Android phones have been infected in a massive redistribution campaigns of banking malware for the mobile OS. Experts at Avast have reported that the malware is an evolved version of what is known as GM Bot…

CYBER NEWS

Google Will Punish You If You Are a Repeated Offender

Google’s Safe Browsing has been safeguarding users from various online threats, and has never failed to evolve accordingly to the needs of users. On November 8 Google announced that they’re going to punish websites that repeatedly endanger users through malware,…

CYBER NEWS
shutterstock_270593417

Australia Launches A $4.5 Million Cyber Security Educational Project

The necessity of understanding cyber security is growing with each passing day. Not only governments should start implementing cyber security education at the highest level – the educational approach should be present everywhere. The Australian federal government has just announced…

CYBER NEWS
hercules-capturing-cerberus-myth

The Cerber 4 Iteration Tango: from Cerber Version 4.1.1 to 4.1.4

The mythological battle between Cerberus and Hercules quite a lot resembles the battle between cyber criminals and researchers. Whose side are you on? The employment of SEO techniques in malware (and ransomware) distribution is not news. Blackhat SEO campaigns are…

CYBER NEWS
nokia-memes

Connecting People Round 2: Two Nokia Android Smartphones In the Making

Do you know a person who hasn’t owned a Nokia? Well, we don’t, and apparently the Nokia trend is about to be revived. According to the website NokiaPowerUser, two Nokia Android phones are being developed at the moment, as per…

CYBER NEWS
tumblr_n4e19igfqt1tz7aq7o1_500

Dyre, Dridex Money Laundering Scheme Ends with 14 Arrests

Follow the money – that’s basically the one rule you need to apply to get to the bottom of… everything, including malware. That being said, the UK National Crime Agency (NCA) not only did follow the money but also arrested…

CYBER NEWS
ransomware-damage-stforum

Locky Ransomware Befriends the Bizarro Sundown Exploit Kit

Locky ransomware is back once again, this time being spread by a new exploit kit, based on the previously known Sundown. The new exploit kit is dubbed Bizarro Sundown and was first noticed on October 5 and then again on…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree