Cyber News - Page 130

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
shutterstock_271501652

WhatsApp’s End-to-End Encryption Prone to SS7 Vulnerabilities

WhatsApp’s recent adoption of end-to-end encryption was a big deal in the cyber security community. However, a research conducted by Positive Technologies reveals that the end-to-end encryption in services such as WhatsApp and Telegram is vulnerable. More specific, researchers have…

CYBER NEWS
pexels-photo

Windows Zero-Day Exploited to Steal Credit Card Data from US Companies

CVE-2016-0167, a zero-day exploit addressed in April’s Patch Tuesday, has apparently been leveraged by attackers, FireEye research reveals. Cyber criminals have exploited the vulnerability in targeted attacks on more than 100 US companies. FireEye’s blog post on the matter discloses…

CYBER NEWS
night-television-tv-theme-machines

Pornhub’s Bug Bounty Program Protects P0rn Fans from Malvertisers

Many big companies and vendors have bug bounty programs which encourage independent researchers in locating and disclosing vulnerabilities. Pornhub has just joined the bug bounty initiative, as it just launched a program on HackerOne’s platform, which aims to protect and…

CYBER NEWS
CVE-sensorstechforum

7-Zip and the Not-So-Hidden Dangers of CVE-2016-2335 Flaws

You’re most likely familiar with 7-Zip, the open-source file archiving application that offers optional AES-256 encryption, support for large files, and the capacity to use all kinds of compression, conversion and encryption methods. The app is also suitable for Windows…

CYBER NEWS
p17_0000

Vishing, Smishing, and Phishing Scams Are After Your Information and Money

If you’re a daily reader of IT security and tech news, you have a good idea of phishing and spear phishing attacks. Nonetheless, even if you’re perfectly acquainted with these widely deployed social engineering schemes, you should be on the…

CYBER NEWS
windows-update-restart-now

May 2016 Patch Tuesday: CVE-2016-0189, KB3155533, KB3156764

Microsoft has just released its security updates for May 2016. And they’re quite major! Two zero-days vulnerabilities have been disclosed, and they’re both crucial – one in Windows, and one in Adobe’s Flash Player. Security experts warn that the Windows…

CYBER NEWS
Viking-Horde-Image

Viking Horde Android Malware in Viking Jump and 4 Other GP Apps

Image Source: https://blog.checkpoint.com/ Viking Horde is not a character from your favorite TV show but a new malware family currently creeping around Android devices. Security researchers at CheckPoint just released a report uncovering the new malware and the dangers it…

CYBER NEWS
malicious-threat-sensorstechforum

PerezHilton.Com, Angler EK and CryptXXX in One Sentence Is Never Good

If you’re a daily visitor of PerezHilton.com, you may be in trouble. It’s been reported that the pop and celebrity news website has compromised some of its 500,000 visitors with the Angler exploit kit, and then with the devastating CryptXXX…

CYBER NEWS
1ly4wkA

Google Data Breach Triggered by a Human Error

Google has been breached! Did we catch your attention? Any news concerning Google and a data breach is worth your full attention. It proves that no company is invincible, Google included. So, what exactly happened? More about Google: Google Knows…

CYBER NEWS
shutterstock_94715374

Jaku Botnet Used in DDoS and Spam Campaigns, Employs Steganography

A previously unknown botnet campaign, named Jaku or JAKU has been investigated by researchers at Forcepoint Security Labs. The botnet has affected more than 19,000 computers, including them in its zombie network. Interestingly, most of the victims appear to be…

CYBER NEWS
users-security-password-day-stforum-pexels

Password Day 2016. Here’s How to Celebrate!

Did you know that Password Day is celebrated on May 5? IT celebrations such as this one make us consider the importance of acting on our online security. So, if you haven’t changed your password(s) in a while, make sure…

CYBER NEWS
hands-woman-laptop-notebook-large

Facebook Account Hijacked? The Best Security Tips to Fix It

Even though it’s a common fact that Facebook is often targeted by phishing scams and “viruses”, user accounts continue being hijacked and hacked. Shortly said, if you become a victim to a smartly crafted phishing email, someone, a crook, will…

CYBER NEWS

German Nuclear Plant Hit by W32.Ramnit and Conficker Worms

Ransomware has been hitting hospitals and putting the well-being of patients at risk for several months now. Attacking healthcare institutions is bad enough. What could be worse? India Times just reported that a nuclear plant in Germany has been infected…

CYBER NEWS
800px-Platinum-nugget

PLATINUM Team Exploits Microsoft’s Hotpatching, Remains Covert

Platinum Nugget. Image Source: Wikipedia There are basically two types of hacking teams. The first type is after quick profit, harvesting credit card numbers and banking details. The second type is more dangerous, even though it may not directly affect…

CYBER NEWS
cyber-police-ransomware-blue-coat-stf

Cyber.Police Android Ransomware Spread Without User Interaction

Image Source: Blue Coat Researchers at Blue Coat have discovered and analyzed a new mobile ransomware campaign that targets older Android devices and doesn’t require user interaction prior to infection. The campaign may be novel but the ransomware has been…

CYBER NEWS
beautiful-people-data-breach-stforum

BeautifulPeople(.)com Dating Site In a Major Data Breach Scandal

Remember the Ashley Madison hack from 2015? On 18 and 20 August, a hacking group called The Impact Team leaked more than 25 gigabytes of company data, user details included. Data breaches of that scale happen quite often and put…

CYBER NEWS
just-google-it-stforum

Ask Google: Is Your Googling As Good As It Could Be?

The search capabilities of the Big G are a lot more flexible and powerful than you may think. Just imagine how much more you could derive from Google, if you were aware of all the tips and tricks on improving…

CYBER NEWS
banking-malware-stforum

Panda Banker Distributed via Macros in Word Documents and EKs

Banking malware has evolved a lot during the last couple of years. New banking malware pieces keep on emerging, targeting banks all over the globe. The latest threat of the kind has been identified by researchers at Proofpoint and Fox…

CYBER NEWS

RansomWhere? Offers Free Protection Against OS X Ransomware

Ransomware is the most vicious cyber threat currently affecting thousands of users on a global level. Mostly affected are users of Windows, being targeted by both sophisticated and simplistic ransomware pieces. However, OS X and Linux users are not spared…

CYBER NEWS
pexels-photo

Angler EK Now Distributes CryptXXX Ransomware and Bedep Malware

Image Source: Pexels.com Cyber criminals are constantly reinventing well-established methods to attack unsuspecting users. One of the most common attack paths is through compromised websites. Once the user has landed on such a website, he will then encounter an exploit…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree