Cyber News - Page 47

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Privacy Commissioner of Canada against Facebook’s Privacy Practices

Canada is one of several countries that launched investigations regarding Facebook’s privacy practices following the Cambridge Analytics scandal. It comes to no one’s surprise that currently Canada’s privacy commissioner is taking Facebook to court in an attempt to force the…

CYBER NEWS

Protecting Your Data from Physical Theft: the 2020 Guide

When you think of protecting your data, does it occur to you that your data also needs physical protection? This article gives valuable insight into what to do when your data is in danger due to physical accidents. Your mobile…

CYBER NEWS

Adult Websites Suffered the Most DDoS Attacks in 2019

A new Imperva report presents a detailed analysis of the DDoS threat landscape in 2019. The report is based on statistical data of 3,643 network layer and 42,390 application layer DDoS attacks, mitigated by the company. The data was gathered…

CYBER NEWS

CVE-2020-0022: Another Dangerous Bluetooth Bug in Android

CVE-2020-0022 is a potentially dangerous remote code execution vulnerability in Bluetooth. The bug is one of the fixes in the February security updates for Android. The flaw was unearthed and reported by German security researchers from ERNW. CVE-2020-0022: What Is…

CYBER NEWS
Bot-Owners-Know-More-About-How-You-Are-Tracked-Online

Bot Owners Know More About How You Are Tracked Online

Nowadays most of us have accepted that we will regularly be tracked as we go about our daily lives. Virtually everything we do on digital devices, especially when we are connected to the internet, is followed by someone somewhere. In…

CYBER NEWS

Coronavirus Emails Are Spreading the Emotet Malware

Exploiting a viral topic for malicious purposes is something quite often seen is spam campaigns. This is what is happening now with the new strain of the coronavirus. A new spam, botnet-driven campaign is spreading malicious files masqueraded as documents…

CYBER NEWS

New Windows 10 UAC Bypass Used by TrickBot to Run with Admin Privileges

The operators of TrickBot Trojan have once again updated its malicious code, and it is now capable of leveraging a new Windows 10 UAC bypass. Through this, the Trojan is capable of executing itself with elevated privileges without displaying a…

CYBER NEWS

LiveRamp Facebook Marketing Agency Hacked and Used For Scamming

Recently news broke about an intrusion that happened back in October last year when criminals were able to break into the LiveRamp Facebook Marketing Agency. This is especially dangerous as the criminals can access sensitive information including payment data. Apparently…

CYBER NEWS

LoRaWAN IoT Protocol Can Be Easily Hacked According to New Research

A new security analysis shows that the popular LoRaWAN IoT protocol can be easily hacked thus exposing the security of the network of devices. This is especially worrying as this is one of the most popular implementations of communications used…

CYBER NEWS

Car Hacking: Are Amazon’s New Automotive Products Secure?

At this year’s Consumer Electronics Show (CES) 2020, Amazon announced several new products and services related to vehicles, including: – Alexa integrations in cars: In addition to their Alexa integrations in vehicles from Toyota, Ford, Audi and BMW, Alexa will…

CYBER NEWS

Free Proxies and VPNs – Safe or Dangerous?

We are living in a world that is heavily dependent on technology and the innovations of tech firms progressively amassing more power than any one of us in our right minds should be comfortable with. Facebook, Google, Apple, Microsoft, Samsung:…

CYBER NEWS

iPhone 11 Pro Max Hacked by The FBI Using GrayKey Tech

Appleinsider has reported that FBI has managed to succeed in breaking the encryption of the smartphone iPhone 11 Pro Max without asking Apple for help. This still does not explain why Apple has been asked by the FBI in the…

CYBER NEWS

The Emergence of Mobile Biometrics, and What to Expect in 2020

Mobile biometrics have been on the rise since Apple released Touch ID in 2013. After its release, the global market for mobile biometrics has earned over $14 billion. To paint a better picture, 57% of today’s available apps feature a…

CYBER NEWS

Large List of Hijacked IoT Data Leaked On The Internet

An unknown criminal or hacking group has leaked a very large list of Telnet credentials from IoT devices. They are mostly from consumer and commonly used networking hardware — routers, servers, access points and etc. The list was posted on…

CYBER NEWS

70,000 Tinder Photos of Women Are Being Sold on an Underground Forum

70,000 Tinder photos of women are being circulated on an underground forum typically used for selling malware. The photos are entirely of women, and cybersecurity researchers believe the photos could be used for malicious purposes. The incident was first reported…

CYBER NEWS

Australian P&N Bank Hit by a Data Breach

Australia has been hit by a serious data breach that took place on December 12, 2019. The largest member-owned bank in Western Australia, P&N Bank has been affected, when its CRM system was accessed by threat actors as a consequence.…

CYBER NEWS
stf-windows-7-end-of-updates

Microsoft Windows 7 End of Life in 2020 – What’s Next?

The end of support for Windows 7 Operating System was marked on January 14, 2020 and the promise has been kept by Microsoft yesterday. Four major updates were released related to the security of Windows. One of them was a…

CYBER NEWS

How to Choose Managed Detection and Response Services

The first step to choosing the right managed detection and response services for your company is to understand what those services offer and why you might need them. These services can go beyond the technology, look to the future, and…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree