Cyber News - Page 119

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
vulnerability-stforum

CVE-2016-7255, 67 Vulnerabilities Addressed by Microsoft

The latest 14 security bulletins by Microsoft have patched 60 vulnerabilities in Windows OS, Office, Edge and Internet Explorer browsers, and SQL servers. One of the bulletins addresses flaws in Adobe Flash Player upgraded via Windows Update in Windows 10…

CYBER NEWS
android-trojan-spylocker

Banking Trojans for Android Infect Over 200,000 Users

Researchers have reported that Android phones have been infected in a massive redistribution campaigns of banking malware for the mobile OS. Experts at Avast have reported that the malware is an evolved version of what is known as GM Bot…

CYBER NEWS

Google Will Punish You If You Are a Repeated Offender

Google’s Safe Browsing has been safeguarding users from various online threats, and has never failed to evolve accordingly to the needs of users. On November 8 Google announced that they’re going to punish websites that repeatedly endanger users through malware,…

CYBER NEWS
shutterstock_270593417

Australia Launches A $4.5 Million Cyber Security Educational Project

The necessity of understanding cyber security is growing with each passing day. Not only governments should start implementing cyber security education at the highest level – the educational approach should be present everywhere. The Australian federal government has just announced…

CYBER NEWS
hercules-capturing-cerberus-myth

The Cerber 4 Iteration Tango: from Cerber Version 4.1.1 to 4.1.4

The mythological battle between Cerberus and Hercules quite a lot resembles the battle between cyber criminals and researchers. Whose side are you on? The employment of SEO techniques in malware (and ransomware) distribution is not news. Blackhat SEO campaigns are…

CYBER NEWS
nokia-memes

Connecting People Round 2: Two Nokia Android Smartphones In the Making

Do you know a person who hasn’t owned a Nokia? Well, we don’t, and apparently the Nokia trend is about to be revived. According to the website NokiaPowerUser, two Nokia Android phones are being developed at the moment, as per…

CYBER NEWS
tumblr_n4e19igfqt1tz7aq7o1_500

Dyre, Dridex Money Laundering Scheme Ends with 14 Arrests

Follow the money – that’s basically the one rule you need to apply to get to the bottom of… everything, including malware. That being said, the UK National Crime Agency (NCA) not only did follow the money but also arrested…

CYBER NEWS
ransomware-damage-stforum

Locky Ransomware Befriends the Bizarro Sundown Exploit Kit

Locky ransomware is back once again, this time being spread by a new exploit kit, based on the previously known Sundown. The new exploit kit is dubbed Bizarro Sundown and was first noticed on October 5 and then again on…

CYBER NEWS
vulnerability-stforum

XSS Bug Found on Wix.com Platform, Built on Open-Source WordPress Library

Have you heard of wix(.)com? Wix.com is a cloud-based web development platform designed for users to build HTML5 web sites and mobile sites through the use of the company’s online drag and drop tools. Unfortunately, a serious XSS bug has…

CYBER NEWS
update-system-health-stforum

Device Security, Vulnerabilities, and Windows

Personal security usually starts with your device. The more unsecure devices are out there, the better is the mechanism behind data breaches and malware infections. So, if you want to be safe and sound, start with your device. Device Security…

CYBER NEWS
shutterstock_270593417

Symantec Endpoint Protection 14 Is All about Machine Learning

Artificial intelligence is changing all aspects of the modern life, our online security included. Machine learning in particular is making its way to forever altering the mechanisms of endpoint protection. The future is literally happening at this very moment, as…

CYBER NEWS
iot-security-environment-stforum

Security Tips for Configuring IoT Devices

Are you thinking of buying a new Internet of Things (IoT) device or you already own such an appliance? You might have heard of the risks attributed to these products, this is just one of the reasons why owners and…

CYBER NEWS
google-monopoly-protonmail

Google Monopoly: ProtonMail Mysteriously Disappeared from Search Results

ProtonMail and Google are in the midst of an altercation. Shortly put, the encryption-savvy company says that Google may have attempted to affect the way ProtonMail shows up in search results. ProtonMail has been attracting more users with its encrypted…

CYBER NEWS
australian-red-cross-stforum

Australian Red Cross Data Breach: 550,000 Blood Donors Exposed

There’s not a single organization that isn’t susceptible to data compromises. The list of various organizations and services that have been through data breaches is getting longer on a daily basis. And now, apparently, the Australian Red Cross should be…

CYBER NEWS
update-system-health-stforum

CVE-2016-7855 Flash Bug Exploited in Limited Attacks

Meet CVE-2016-7855, yet another Adobe Flash Player vulnerability of the zero-day type. Adobe has already released a security bulletin, APSB16-36, addressing the issue in versions of Flash from 23.0.0.185 and earlier affected by the flaw. Linux users should keep in…

CYBER NEWS
hologram-order-66-star-wars-stormtrooper-sensorstechforum-windows10-hologram

Windows 10 2017 Creators Update with Hologram-Like Augmented Reality

A major update is about to surprise Windows 10 users. The update is famous under the name Redstone 2, and it is expected to be available from Spring 2017. What is interesting with this update is that It has a…

CYBER NEWS
shutterstock_223094779

Danish Company Reports 100,000 Credit Cards Possibly Compromised

A payment processing company going by the name Nets from Denmark has reported several local banks that they should discontinue 100,000 credit cards because of fears the cards have been hacked, the firm says. The company has been reported by…

CYBER NEWS
iot-security-environment-stforum

A Secure IoT Environment Means Secure Life

“In the next century, planet Earth will don an electronic skin. It will use the Internet as a scaffold to support and transmit its sensations. This skin is already being stitched together. It consists of millions of embedded electronic measuring…

CYBER NEWS
vulnerability-stforum

CVE-2016-5195 Found in Every Linux Version (for the Last 9 Years)

CVE-2016-5195 is a Linux vulnerability in the wild which is most likely found in every Linux version for the last nine years. Linux users should consider installing a security patch immediately. The vulnerability is a Kernel Local Privilege Escalation one…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree