Cyber News - Page 144

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
Dropbox-for-Business

Dropbox For Business With an Additional Security Certification

Dropbox announced the issue of ISO 27001 certificate, an addition to the serious list of compliances for Dropbox for Business. The new certificate includes 2013 revision of the standard certificate and has been updated and upgraded with the cloud services…

CYBER NEWS
TOR-Exit-Server

Malicious Binaries Delivered by TOR Exit Server

Josh Pitts with Leviathan Security discovered an ”exit node” for the TOR network that is currently located in Russia and has been used to distribute a modified version of the legitimate code that the user has requested. In order to…

CYBER NEWS
Apple-pay

New Apple Pay Privacy Method – Is It worth It?

Apple Pay method is a new way for iPhone 6 and iPhone 6 Plus users to purchase goods and services without disclosing their debit or credit cards or any other bank information to merchants, thus remaining anonymous. All the users…

CYBER NEWS
SEDNIT

Pawn Storm Uses SEDNIT for Espionage Purposes

Created in 2007, Pawn Storm is the name of a cyber-espionage operation whose main aim is targeting military, governments and media entities. The name Pawn Storm comes from a chess action where the pawns are organized into a massive defense…

CYBER NEWS
Twitch.TV

PUP and PUA Prompts on a Fake Copy of the Twitch.tv Streaming Video Platform

Twicth.tv is a web-site platform created to connect gamers throughout all over the world. Twict.tv helps gamers connect, chat and communicate no matter where they play games from. It was recently discovered that the site has a relatively good fake…

CYBER NEWS
Windows Zero-Day Misused in Hackers Attacks

Windows Zero-Day Exploited in Hackers Attacks

A new zero-day flaw has been actively exploited by cyber-criminals, targeting primarily users on workstations and servers who open files with embedded OLE (Object Linking and Embedding) objects. At the moment, the vulnerability is exploited via PowerPoint files. OLE objects…

CYBER NEWS
Malvertising Campaign Aimed at Changing the DNS Settings of Home Routers

Malvertising Campaign Aimed at Changing the DNS Settings of Home Routers

A payload for altering the DNS settings of home routers is being delivered through a malicious advertisement inserted in a big online advertising network. The definition for malvertising is an attack in which the cyber criminals take advantage of third-party…

CYBER NEWS
Zero Day Vulnerability Threatens Microsoft Windows Security

Zero Day Vulnerability Threatens Microsoft Windows Security

In a security advisory released yesterday, Microsoft has warned about a just-discovered vulnerability of all Windows systems due to security hack attacks. The threat is found in the Windows Object Linking function (OLE). The function is developed so users can…

CYBER NEWS
FIDO-USB-Port

FIDO – New 2-Step Verification Security Method – Offered By Google Now

Google have announced yesterday that they are expanding their security verification methods with one more – a USB stick security key acting as a 2-step verification method for users to log into web-sites when using the Google Chrome browser. The…

CYBER NEWS
Recentlty-Patched-Adobe-Flash-Vulnerability

A Recently Patched Adobe Flash Flaw Integrated in Fiesta Exploit Kit

A Flash Player security vulnerability that has been patched by Adobe in the most recent update of the product has been added to a commercial exploit kit, named Fiesta, known for the drive-by attacks it is used in. The flaw…

CYBER NEWS
Most popular ways less technical people fall victim to cybercriminals

Most Popular Ways Less Technical People Fall Victim to Cyber Criminals

Let’s face it – in the digital era the less technical computer users are the hackers’ favorite targets in every campaign, be that data theft or corporate espionage. In many cases, the only thing needed for the success of a…

CYBER NEWS
Icloud-china

China Connection to iCloud With Redirection to Bogus Log-In Page

People who were trying to access the iCloud service from China were recently having troubles. They have been blocked and their connection was been directed to a phishing page that collects the user credentials. The IT security specialists are figuring…

CYBER NEWS
Microsoft-Oct-2014

Adware and Browser Modifiers with Changed Detection by Microsoft

As PC users, we are doing everything in the web browsers and this would have been wonderful if the cyber attackers, advertisers and scammers have not been trying to get their code in the browsers that we use. This is…

CYBER NEWS
Facebook Increases the Bounties for Ad-Related Flaws

Facebook Increases the Bounties for Ad-Related Flaws

As hackers keep on targeting the online advertising world, which is considered the back of the Internet economy, more and more online brands are facing the need to eliminate the hoax of malvertising. A fresh example for such action is…

CYBER NEWS
Asprox Botnet Grows Through Spam Emails

Asprox Botnet Grows Through Spam Emails

The creators of Asprox botnet are sending spam emails promising a free Starbucks gift card in order to expand the capacity of the botnet. The main purpose of the spam campaign is to enlarge the botnet, which has been known…

CYBER NEWS
Wolf of Wall Street Campaign Uses Botnets to Deliver Spam Emails

“Wolf of Wall Street” Campaign Uses Botnets to Deliver Spam Emails

A spam e-mail that aims to increase the stock value of a Canadian penny stock company has been delivered to numerous users last week. As a result of the campaign, the transaction volume increased significantly. The company in question is…

CYBER NEWS
ssl-certificate-attaced

Microsoft SSL 3.0 Certificate Attacked by New POODLE Bug

Google researchers Bodo Möller, Thai Duong & Krzysztof Kotowicz announced yesterday that they have recently discovered Padding Oracle On Downgraded Legacy Encryption, known as POODLE, to be attacking the SSL 3.0 version of the public-encryption key introduced by Microsoft back…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree