Cyber News - Page 125

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
banking-malware-stforum

Rio 2016 Malware: Sphinx Banking Trojan Targets Brazilian Banks

The Sphinx Zeus banking Trojan first emerged in August 2015, exactly a year ago, but has been recently updated and detected in new campaigns. This time Sphinx is targeting Brazilian banks and Boleto, Brazilian payment methods. Not surprisingly, the attacks…

CYBER NEWS
vulnerability-stforum

Spoofing Flaw Found in Chrome and Firefox Address Bar

It’s no wonder that people are often wondering which the most secure browser is. Browsers are often leveraged in various attack scenarios, and even an updated browser can fall victim to attackers. One of the recent serious security issues that…

CYBER NEWS
cyber-security-services-risks-stforum

6 Cyber Security Services to Protect You and Your Website

The Web is an amusing yet a very dangerous place. No matter whether you are “an average user” or a webmaster, you should always be prepared. Ransomware, vulnerabilities, security breaches, the list of online threats is endless. Fortunately, cyber criminals…

CYBER NEWS
falseconnect_flow-research-stforum

FalseCONNECT Flaw Intercepts HTTPS Traffic, Affects Apple, Microsoft, Google

A new security vulnerability that can put a range of products at risk has been just disclosed by security researcher Jerry Decime. He has revealed shocking details about the flaw, dubbed FalseCONNECT. According to Decime’s analysis, the vulnerability can allow…

CYBER NEWS
cortana-enemy-windows10-stforum

Cortana Is Not Your Friend but Your Enemy, and Here’s Why

Have you installed Windows 10 already? If so, we have one question for you – did you install it with “Express settings”? If you have, this article may really bother you (if you care about your life’s privacy), and you…

CYBER NEWS
shark-ransomware-project-ransom-note-stforum

Shark Ransomware Delivers Working Payloads, but Is Scamming Newbie Crooks?

Meet Shark, a ransomware project discovered by Serbian security researchers GrujaRS and reported by Softpedia. The project is freely distributed on the Deep Web. However, a deeper look into Shark revealed that it’s a scam even though it delivers valid…

CYBER NEWS
_HOW_TO_Decrypt-sensorstechforum-cryptowall

6,674 File Extensions Targeted by Smrss32 Ransomware

Are you a victim of Smrss32 ransomware? We hope that your system is fully patched and that all your data is sufficiently backed up, but if you have fallen victim to this malware, keep reading. It’s the latest crypto virus…

CYBER NEWS
MR. ROBOT -- "eps2.4_m4ster%u2010s1ave.aes" Episode 206 -- Pictured: (l-r) Christian Slater as Mr. Robot, Rami Malek as Elliot Alderson, Vaishnavi Sharma as Elliot's Mother, Carly Chaikin as Darlene -- (Photo by: Michael Parmelee/USA Network)

Mr. Robot Season 2 Hacks and Exploits: Master/Slave and Rubber Ducky

Have you been impatiently looking forward to Mr. Robot’s second season? Do you always have questions about the hacks that take place during the show? Are you often pausing to have a closer look at what’s written on that PC…

CYBER NEWS
bing-vc-browser-hijacker-stforum

Bing(.)vc Hijacker Now Spread with Legitimate Driver Utilities

Bing(.)vc is a well-known browser hijacker that has been around for a while now. The latest version of the hijacker, however, has been reported to spread via legitimate-like applications. To blame for this is the infamous method of bundling. Related:…

CYBER NEWS
hacked-instagram-accounts-symantec-stforum

Instagram Scam Alert – Profiles Hacked to Promote NSFW Content

Do you have an Instagram account which you use on a regular basis? If so, feel warned – there’s a trend of hacked Instagram profiles promoting adult content. This trend was spotted at the beginning of 2016 but is currently…

CYBER NEWS
we-vibe-4-plus-hacked-privacy-stforum

Teledildonics 101: We-Vibe 4 Plus Adult Toy Hacked for Your Privacy

Nowadays, everything can be hacked, people and electronic devices of all sorts. We recently wrote about the IoT thermostat hack demonstrated during the DEF CON 24 in Las Vegas. Today we are about to tell you about a similar hack,…

CYBER NEWS
android-phone-small-stforum

Is Your Android Prone to QuadRooter Flaws? 900 Million Devices Are!

We all know Android is vulnerable, but how vulnerable is it really? 2016 has already seen a bunch of security flaws in the popular mobile operating system. And some of them are quite serious! Just a couple of days ago…

CYBER NEWS
how-does-pay-per-install-work-sensorstechforum

The Pay-Per-Install Affiliate Business – Making Millions out of Adware

There’s hardly an active online user who doesn’t know what a PUP is (mostly from first-hand experience). At best, potentially unwanted programs provide little to no benefit, and at worst, they can be quite harmful to your system. In addition…

CYBER NEWS
ransomware-sensorstechforum

IoT Thermostat Hack Ends with Ransomware Infection

We already know that the Internet of things is hackable and that it provides cyber criminals another way to exploit us and our devices. Where the vulnerability of IoT is headed can also be seen in the first two episodes…

CYBER NEWS
device-hijacking-apple-vulnerabilities-stforum-2-header

Apple Bug Bounty Program Started, $200,000 for Critical Bugs

Apple followed Google and other notable software giants in creating their own Bug Bounty program. Apple Bug Bounty program provides security experts a way to make money by submitting information about vulnerabilities to Apple. Why Is Apple Joining the Bug…

CYBER NEWS
windows95-printer-vulnerability-stforum

Printer Vulnerability Since Windows 95 Put Entire Enterprises at Risk

Printer Vulnerability – How Using a Printer Can Attract Threats Every home office or business uses printers in their daily work – if we are printing out an essay at home, or we are printing out a contract in the…

CYBER NEWS
hands-woman-laptop-notebook-large

3 Offbeat Techniques to Secure Your Laptop

Today, most businesses run on laptops. Business users are often targeted by malware. One question that every business owner has to answer is how secure the laptops within their organization really are. According to CSO Online, every business should take…

CYBER NEWS
stop-ransomware-sensorstechforum

The Best Way to Beat Ransomware? Greylisting and Removal of Admin Rights

The simultaneous greylisting of applications and removal of local admin rights works as the best protection against ransomware. This is the result of a study executed by CyberArk Labs, published in August 2016. The company tested more than 23 000…

CYBER NEWS
user-tracking-fingerprinting-stforum

Battery Status API Employed for Online Tracking Reasons

Tracking is one of the serious privacy issues users are facing on a daily basis. If a party wants to get your personal information, it may get quite creative in the ways to obtain it. One of the most recent…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree