Cyber News - Page 130

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
1ly4wkA

Google Data Breach Triggered by a Human Error

Google has been breached! Did we catch your attention? Any news concerning Google and a data breach is worth your full attention. It proves that no company is invincible, Google included. So, what exactly happened? More about Google: Google Knows…

CYBER NEWS
shutterstock_94715374

Jaku Botnet Used in DDoS and Spam Campaigns, Employs Steganography

A previously unknown botnet campaign, named Jaku or JAKU has been investigated by researchers at Forcepoint Security Labs. The botnet has affected more than 19,000 computers, including them in its zombie network. Interestingly, most of the victims appear to be…

CYBER NEWS
users-security-password-day-stforum-pexels

Password Day 2016. Here’s How to Celebrate!

Did you know that Password Day is celebrated on May 5? IT celebrations such as this one make us consider the importance of acting on our online security. So, if you haven’t changed your password(s) in a while, make sure…

CYBER NEWS
hands-woman-laptop-notebook-large

Facebook Account Hijacked? The Best Security Tips to Fix It

Even though it’s a common fact that Facebook is often targeted by phishing scams and “viruses”, user accounts continue being hijacked and hacked. Shortly said, if you become a victim to a smartly crafted phishing email, someone, a crook, will…

CYBER NEWS

German Nuclear Plant Hit by W32.Ramnit and Conficker Worms

Ransomware has been hitting hospitals and putting the well-being of patients at risk for several months now. Attacking healthcare institutions is bad enough. What could be worse? India Times just reported that a nuclear plant in Germany has been infected…

CYBER NEWS
800px-Platinum-nugget

PLATINUM Team Exploits Microsoft’s Hotpatching, Remains Covert

Platinum Nugget. Image Source: Wikipedia There are basically two types of hacking teams. The first type is after quick profit, harvesting credit card numbers and banking details. The second type is more dangerous, even though it may not directly affect…

CYBER NEWS
cyber-police-ransomware-blue-coat-stf

Cyber.Police Android Ransomware Spread Without User Interaction

Image Source: Blue Coat Researchers at Blue Coat have discovered and analyzed a new mobile ransomware campaign that targets older Android devices and doesn’t require user interaction prior to infection. The campaign may be novel but the ransomware has been…

CYBER NEWS
beautiful-people-data-breach-stforum

BeautifulPeople(.)com Dating Site In a Major Data Breach Scandal

Remember the Ashley Madison hack from 2015? On 18 and 20 August, a hacking group called The Impact Team leaked more than 25 gigabytes of company data, user details included. Data breaches of that scale happen quite often and put…

CYBER NEWS
just-google-it-stforum

Ask Google: Is Your Googling As Good As It Could Be?

The search capabilities of the Big G are a lot more flexible and powerful than you may think. Just imagine how much more you could derive from Google, if you were aware of all the tips and tricks on improving…

CYBER NEWS
banking-malware-stforum

Panda Banker Distributed via Macros in Word Documents and EKs

Banking malware has evolved a lot during the last couple of years. New banking malware pieces keep on emerging, targeting banks all over the globe. The latest threat of the kind has been identified by researchers at Proofpoint and Fox…

CYBER NEWS

RansomWhere? Offers Free Protection Against OS X Ransomware

Ransomware is the most vicious cyber threat currently affecting thousands of users on a global level. Mostly affected are users of Windows, being targeted by both sophisticated and simplistic ransomware pieces. However, OS X and Linux users are not spared…

CYBER NEWS
pexels-photo

Angler EK Now Distributes CryptXXX Ransomware and Bedep Malware

Image Source: Pexels.com Cyber criminals are constantly reinventing well-established methods to attack unsuspecting users. One of the most common attack paths is through compromised websites. Once the user has landed on such a website, he will then encounter an exploit…

CYBER NEWS
end-to-end-encryption-whatsapp

End-to-End Encryption, WhatsApp and the Next Big Thing in Cyber Security

No matter if you are an Apple fan or not, you have definitely heard or read about the dispute between FBI and Apple. Moreover, this dispute has triggered a strong wave of discussions about encryption in general, specifically end-to-end encryption.…

CYBER NEWS
image-captcha-facebook-blackhat-stforum

Facebook’s and Google’s CAPTCHAs Defeated!

CAPTHAs, or Completely Automated Public Turing test to tell Computers and Humans Apart, can be pretty annoying sometimes, but, in terms of online security, they are a necessary evil. Unfortunately, Google’s and Facebook’s CAPTCHA services have been broken down by…

CYBER NEWS
pexels-photo-67112

Let’s Google Google! Not so Popular Facts about The Search Engine

Image Source: Pexels.com Can you imagine your life without Google? Perhaps you can, perhaps you can’t. And perhaps it depends on whether you were born before or after Google was introduced to the world. Nonetheless, the truth is we use…

CYBER NEWS
password-brute-force-stforum

Brute Force Attacks – a Threat to Encryption

What Is a Brute Force Attack? Brute force attacks may sound like something very complicated but they are easy to explain and understand. However, the protection against them is not as easy to achieve. In the language of cyber security,…

CYBER NEWS
missing-files-1

Obfuscation in Malware – the Key to a Successful Infection

Malware attacks are on the rise and as CRO of F-Secure Mikko Hypponen said on Ted talks – “It is no longer a war against our computers, it is now a war against our lives.” To better protect ourselves from…

CYBER NEWS
world-backup-day-stforum

World Backup Day: to Backup or Not to Backup My Computer Files?

Image Source: www.gotcredit.com Today is World Backup Day. So, why is it so important to backup your files? Let’s see: The cat jumps on your desk and walks by the lap top spilling the coffee on your keyboard – as…

CYBER NEWS
pexels-photo-51415

Advanced Persistent Bots Can Mimic Human Behavior

We know about advanced persistent threats. But what do we know about advanced persistent bots? Advanced Persistent Bots – The New Emerging Threat According to the latest annual report by Distil Networks, the number of bad bots has increased sensibly…

CYBER NEWS
stfu-usb-thief

New USB Thief Trojan Now Has the Ability to Self-Protect

ESET researchers have identified an Infostealer Trojan that is activated via USB drive specially configured for it. The info stealer can slip past antivirus software undetected and run as a legitimate svchost process in Windows. The malware’s detections names given…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree