Cyber News - Page 63

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Alexa Is Spying on You to Help Amazon Improve It

Special team has been recently assigned in reviewing audio in Alexa with the main goal to help improve the way the device responds to commands. Amazon’s Alexa has been purchased countless times and has been used by a lot of…

CYBER NEWS

Microsoft Refuses to Patch Zero-Day Exploit in Internet Explorer

Microsoft has declined to patch a zero-day vulnerability in Internet Explorer for which a security researcher published details and proof-of-concept. The flaw can allow attackers to steal files from computers running Windows. More specifically, the researcher successfully tested the zero-day…

CYBER NEWS

Phishing Statistics: 1 in 99 Emails Is A Phishing Attack

New alarming statistics reveal that approximately 25 percent of phishing emails taken from a batch of 55 million analyzed emails were marked as clean by Office 365 Exchange Online Protection (EOP). This means that these phishing emails got to recipients’…

CYBER NEWS

WPA3 Vulnerabilities Enable Attackers to Uncover Wi-Fi Passwords

A new research reveals vulnerabilities in “a limited number of early implementations of WPA3™-Personal, where those devices allow collection of side channel information on a device running an attacker’s software, do not properly implement certain cryptographic operations, or use unsuitable…

CYBER NEWS

Highly Sophisticated TajMahal APT Framework Goes Undetected for Years

A new highly sophisticated APT framework used for spying purposes was recently uncovered by security researchers. The malicious framework has been in operation for at least 5 years but it’s the first time it’s been detected. The framework has been…

CYBER NEWS

Microsoft Bugs CVE-2019-0803, CVE-2019-0859 Exploited in the Wild

April 2019 Patch Tuesday is here, consisting of fixes for 74 vulnerabilities. Note that two of the flaws (CVE-2019-0803 and CVE-2019-0859, see details below) are actively exploited in attacks in the wild. 13 of the vulnerabilities are rated critical, and…

CYBER NEWS

Verizon Fios Quantum Gateway Vulnerable (CVE-2019-3914)

Verizon Fios Quantum Gateway contains three high-severity vulnerabilities (CVE-2019-3914, CVE-2019-3915, CVE-2019-3916). which could allow command injection. When exploited at once, the flaws could give an attacker complete control over a network. Note that the device is used by millions of…

CYBER NEWS

Anubis Android Malware Spotted in New Campaigns

In December, 2017, malware researchers came across several apps that were published on Google Play and third-party app stores. The apps had surveillance capabilities. Because of the name of the malware’s payload, watchdog, the researchers named the apps AnubisSpy. Anubis…

CYBER NEWS

Exodus iOS Spyware – What Surveillance Capabilities Does It Have?

The previously known Exodus spyware which plagued Google Play Store and respectively Android devices, is now equipped with a version for iOS. According to Lookout researchers, the iOS counterpart is less sophisticated than the Android version, and hasn’t been detected…

CYBER NEWS

Beware the “IMPORTANT! You have been recorded ʍasturbating!” Scam

Another version of the “ATTENTION! You are screwed now” scam is currently circling the web. The subject line used by the scammer this time is “IMPORTANT! You have been recorded ʍasturbating! I have [email’s name].mp4!”. Related: [wplinkpreview url=”https://sensorstechforum.com/remove-save-yourself-scam/”] “Save Yourself”…

CYBER NEWS

4 Reasons Why You Receive Sextortion and Other Email Scams

Sextortion (porn blackmail) scams distributed over email are becoming increasingly popular. Individuals from all over the world are receiving threatening email messages from people (scammers) that claim they have video recordings made via the individuals’ device camera. The recording purportedly…

CYBER NEWS

Beware the “ATTENTION! You are screwed now” Scam

Another day, another extortionist scam. As we’ve already said before, all recent scams delivered via email have one thing in common – they create a sense of fear and urgency in order to persuade the recipient to transfer a large…

CYBER NEWS

Xwo Python-Based Scanner Actively Scanning for Exposed Web Services

Security researchers recently discovered a new tool that is actively scanning for exposed web services and default passwords. The researchers dubbed the malicious tool “Xwo”. The name is taken from its primary module name. Xwo is most likely related to…

CYBER NEWS

2 Third Party Apps Exposed Millions of Facebook Users Records

There are two new cases of data sets exposing tons of information belonging to Facebook users. More specifically, half a billion records of millions of users of Facebook were openly available to the public internet. The records were found on…

CYBER NEWS

3 Ways Blockchain Will Change the Way You Use Passwords

Passwords are a pain in the ass. You and I can agree on that. The number of memes out there about passwords proves the point. Sites ask for your password to contain a capital letter, lowercase letter, numbers, a special…

CYBER NEWS

CVE-2019-0211: Vulnerability in Apache HTTP Server

CVE-2019-0211 is a new vulnerability in Apache HTTP Server software. The bug which was discovered by Ambionics security researcher Charles Fol has already been fixed in the latest version of the software, 2.4.39. The update should be applied immediately –…

CYBER NEWS

Router Security: 10 Simple Tips to Protect Yourself

Routers are an important part of the communication network. This networking device forwards the data between different computer networks. Usually, cat6 outdoor cables are used for router connections. As it connects different networks, hence router security is very important. Related:…

CYBER NEWS

Gamification and Cybersecurity: Elements of a Successful Strategy

Cybersecurity is a persistent problem throughout the business world – from small businesses to huge corporations. Implemented techniques and tools often fail to prevent data breaches due to human error. According to the 2018 Data Breach Investigations Report by Verizon,…

CYBER NEWS

Two Zero-Day Flaws in Edge and Internet Explorer Remain Unpatched

Two unpatched zero-day vulnerabilities lurk in Microsoft Edge and Internet Explorer, and there’s even proof-of-concept code available. The flaws were discovered by 20-year-old security researcher James Lee, and they could allow a malicious website to perform universal cross-site scripting attacks…

CYBER NEWS

Game of Thrones and the Risks of Malware in Streaming and Torrenting

Game of Thrones, in addition to being the most popular TV show in terms of fandom, is also the most popular TV show when it comes to malware. Of course, Game of Thrones is not the only series associated with…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree