Cyber News - Page 129

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
iphone-apple-encryption-jon-callas

Mobile Encryption Expert Jon Callas Rehired by Apple

Encryption continues to be the center of discussions – be it ransomware’s encryption, WhatsApp’s end-to-end encryption… or Apple’s encryption debate. Speaking of Apple, the company just rehired a mobile encryption pioneer, Jon Callas, quite possibly to address the pressure from…

CYBER NEWS
data-breach-stforum

A Data Breach Is a Breach in Trust. LinkedIn’s Version

Image Source: Stephencdickson/ Wikipedia LinkedIn’s data breach is already becoming one of the most controversial and troubling recent data incidents. And it proves that a data breach is definitely a breach in trust – between the vendor and the end…

CYBER NEWS
data-loss-prevention-data-breach-stforum

49 Weakest Passwords in LinkedIn’s Data Breach 2016

Have you changed your LinkedIn password yet? As we wrote yesterday, the popular social network for professionals has been through a major data breach. To sum it up, 167 million compromised accounts, of which 117 million credentials with hashed passwords…

CYBER NEWS
teslacrypt-ransomware-master-decryption-key

The End of TeslaCrypt – Master Decryption Key Available

TeslaCrypt ransomware has turned many users into victims. However, this ransomware story may be coming to its foreseeable end. According to an ESET researcher, the vicious file-encryption operation is now shut down. A free decryption key is available to anyone…

CYBER NEWS
get-windows-10-app-sensorstechforum

Get Windows 10 App Is Now Scheduled, Upgrade or Cancel

The Get Windows 10 App has caused many users many headaches. Because of its aggressive Get Window 10 campaign, Microsoft has been in and out of controversies for quite some time. Fortunately, the company has decided to change the way…

CYBER NEWS
linkedin-167-million-accounts-data-breach-stforum

LinkedIn Data Breach: 117 Million Accounts Up For Sale

If you’re a professional in any business area, there’s a big chance you have a LinkedIn account. So read carefully – LinkedIn has suffered a major data breach. The latter has apparently led to probable sale of sensitive information harvested…

CYBER NEWS
cisco-logo-CVE-2016-1379-CVE-2016-1385

Cisco Patches ASA Software against CVE-2016-1385, CVE-2016-1379

If you’re a user of Cisco’s Adaptive Security Appliances (ASAs), you should probably have a look at their latest patches. The patches are addressing two separate issues, CVE-2016-1385, a flaw in the ASA XML parser, and CVE-2016-1379, a VPN block…

CYBER NEWS
p12_0000

Pornhub in a Server Breach Hoax, Hacker’s Claims Rated Bogus

Shortly after Pornhub announced their Bug Bounty program, a gray hat hacker known as Revolver released claims that the website’s web server was compromised. Were his claims true or just a cry for attention? Let’s see. Read More about PH’s…

CYBER NEWS
google-certificate-Redirector.Paco

Redirector.Paco Clickbot Steals Millions of AdSense Revenue

Bitdefender security researchers have discovered a clickbot, dubbed Redirector.Paco which has continuously abused companies’ Google advertising revenues. Cristina Vatamanu, Răzvan Benchea, and Alexandru Maximciuc have discovered that the botnet’s start of activity dates back to September 2014. Since then, over…

CYBER NEWS
symantec-exploit-tavis-ormandy

Symantec/Norton CVE-2016-2208 Flaw Causes Remote Memory Corruption

Software products are not perfect and can be full of vulnerabilities, anti-virus software included. Bug hunters and white hats are usually the ones to disclose flaws in applications, and to notify the vendors so that a fix is implemented. If…

CYBER NEWS
google-chrome

Google Chrome’s HTML5 by Default Pushes Flash Player Aside

Vulnerabilities in Adobe’s Flash Player may seem trivial but yet they are among the flaws mostly leveraged by attackers. Perhaps that’s a reason good enough for Google to decide to make HTML5 the primary standard in Chrome. Only 10 white-listed…

CYBER NEWS
shutterstock_271501652

WhatsApp’s End-to-End Encryption Prone to SS7 Vulnerabilities

WhatsApp’s recent adoption of end-to-end encryption was a big deal in the cyber security community. However, a research conducted by Positive Technologies reveals that the end-to-end encryption in services such as WhatsApp and Telegram is vulnerable. More specific, researchers have…

CYBER NEWS
pexels-photo

Windows Zero-Day Exploited to Steal Credit Card Data from US Companies

CVE-2016-0167, a zero-day exploit addressed in April’s Patch Tuesday, has apparently been leveraged by attackers, FireEye research reveals. Cyber criminals have exploited the vulnerability in targeted attacks on more than 100 US companies. FireEye’s blog post on the matter discloses…

CYBER NEWS
night-television-tv-theme-machines

Pornhub’s Bug Bounty Program Protects P0rn Fans from Malvertisers

Many big companies and vendors have bug bounty programs which encourage independent researchers in locating and disclosing vulnerabilities. Pornhub has just joined the bug bounty initiative, as it just launched a program on HackerOne’s platform, which aims to protect and…

CYBER NEWS
CVE-sensorstechforum

7-Zip and the Not-So-Hidden Dangers of CVE-2016-2335 Flaws

You’re most likely familiar with 7-Zip, the open-source file archiving application that offers optional AES-256 encryption, support for large files, and the capacity to use all kinds of compression, conversion and encryption methods. The app is also suitable for Windows…

CYBER NEWS
p17_0000

Vishing, Smishing, and Phishing Scams Are After Your Information and Money

If you’re a daily reader of IT security and tech news, you have a good idea of phishing and spear phishing attacks. Nonetheless, even if you’re perfectly acquainted with these widely deployed social engineering schemes, you should be on the…

CYBER NEWS
windows-update-restart-now

May 2016 Patch Tuesday: CVE-2016-0189, KB3155533, KB3156764

Microsoft has just released its security updates for May 2016. And they’re quite major! Two zero-days vulnerabilities have been disclosed, and they’re both crucial – one in Windows, and one in Adobe’s Flash Player. Security experts warn that the Windows…

CYBER NEWS
Viking-Horde-Image

Viking Horde Android Malware in Viking Jump and 4 Other GP Apps

Image Source: https://blog.checkpoint.com/ Viking Horde is not a character from your favorite TV show but a new malware family currently creeping around Android devices. Security researchers at CheckPoint just released a report uncovering the new malware and the dangers it…

CYBER NEWS
malicious-threat-sensorstechforum

PerezHilton.Com, Angler EK and CryptXXX in One Sentence Is Never Good

If you’re a daily visitor of PerezHilton.com, you may be in trouble. It’s been reported that the pop and celebrity news website has compromised some of its 500,000 visitors with the Angler exploit kit, and then with the devastating CryptXXX…

CYBER NEWS
1ly4wkA

Google Data Breach Triggered by a Human Error

Google has been breached! Did we catch your attention? Any news concerning Google and a data breach is worth your full attention. It proves that no company is invincible, Google included. So, what exactly happened? More about Google: Google Knows…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree