Cyber News - Page 68

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
malware attacks image

Metro Bank Victim of Sophisticated 2FA Attack That Exploits SS7

Metro Bank has been in a cyberattack that targeted the codes sent via text messages to customers to verify transactions. In other words, the bank is a victim of a sophisticated 2FA bypass attack. The bypass was possible after the…

CYBER NEWS

“We striked you” Scam Extorts YouTube Channels

Scammers are always looking for new exploitation methods. The latest fraudsters’ trend involves abusing YouTube’s policy violation system by filling fake copyright infringements against content creators. The scammers are using this trick to extort the owners of the channels. “We…

CYBER NEWS

CookieMiner Mac Malware Wants Your Cookies and Your Crypto Funds

A new instance of Mac malware has been detected by researchers at Palo Alto Networks. The malware is designed to steal browser cookies and other information and it also steals cryptocurrencies on infected Mac computers. The malware is dubbed CookieMiner,…

CYBER NEWS

New Data Leak Record: Collection #2-5 Has 845 Gigabytes of Stolen Data

It’s early 2019, and we’ve already witnessed not one but two record-breaking data dumps. The first one, known as Collection #1, consisted of approximately 773 million unique email IDs and 21 million unique passwords, and was reported by Troy Hunt…

CYBER NEWS

Severe Vulnerability Affects 3G, 4G and the Upcoming 5G Protocol

Security researchers have uncovered a new vulnerability in the upcoming 5G communications protocol. The flaw appears to be more severe than the ones previously discovered in 3G and 4G. To top that off, this new vulnerability affects all three standards!…

CYBER NEWS

Hackers Can Exploit Systemd-Journald Via CVE-2018-18865, CVE-2018-16866

The systemd-journald service has been found to be affected by two dangerous vulnerabilities that are tracked in the CVE-2018-16865 and CVE-2018-16866 advisories. By exploiting them, computer criminals can manipulate the memory and take over control of the machines. Nowadays sytemd-journald…

CYBER NEWS

Beauty Camera Android Apps with Millions of Installs Promote Porn Ads

Trend Micro researchers just discovered and reported a number of malicious beauty camera apps for Android on Google Play store, some of which downloaded millions of times. The apps could access remote ad configuration servers that could be used for…

CYBER NEWS

Airbus Data Breach Exposed Personal Information of European Employees

Another day, another data breach. European airplane manufacturer Airbus has confirmed a data breach affecting its Commercial Aircraft business information systems. Airbus Data Breach Is Still Being Investigated The breach allowed access to personal information belonging to some of its…

CYBER NEWS

How to Protect Your Business from a Data Breach

Cybersecurity is critical for all businesses today. Whether you run an online store or you simply have computers and devices connected to the internet you need to guard against data breaches. You also need to have a plan to improve…

CYBER NEWS

Ubuntu 18.04 LTS Users Should Update Immediately to Patch 11 Flaws

Canonical recently published a major Linux kernel security update for the Ubuntu 18.04 LTS (Bionic Beaver) operating system series. The update addresses eleven security flaws which were discovered by independent security researchers. In other words, the 4.15.0-44.47 kernel contains 11…

CYBER NEWS

Apple Revokes Facebook’s Distribution Certificate, Is Google Next?

Apple and Facebook are making the headlines once again with the news that Apple has stopped critical apps associated with the social media that use the Apple Developer Enterprise Program. This decision has been made as a consequence of a…

CYBER NEWS

iCloud Bug May Have Exposed Data to Other Users

Security researchers just reported about a possible breach of iCloud that took place late last year. Purportedly, a bug in the platform may have exposed iCloud data to other users. And by the looks of it, Apple chose to remain…

CYBER NEWS

Facebook Research VPN Pays Teens $20 to Get Root Access to Devices

Reportedly, Facebook has been paying people of a certain age group to install a data harvesting VPN tool known as the “Facebook Research” VPN, but also referred to as Project Atlas. The tool has been offered to iOS and Android…

CYBER NEWS

FaceTime Bug Discovered by 14-Year-Old, Apple Is Facing Lawsuit

Regardless of the fact that you own or don’t own an Apple device, you must have heard about the serious security bug in the FaceTime app. It is all over the news, and it should be. The FaceTime App Bug…

CYBER NEWS

Facebook Messenger, Instagram, WhatsApp to Become One Platform

Facebook is planning to unify Facebook Messenger, Instagram and WhatsApp into one messaging platform, the New York Times recently reported. To be more precise, the plan is to keep the apps separate but unify their technical and software architecture. This…

CYBER NEWS

Microsoft Discontinues Metadata Service in Windows 7’s Media Player

Researchers that closely follow Microsoft’s movements have noticed a new support document which, apparently, was quietly published. The document says that the company is abandoning a feature used in Windows Media Center and Windows Media Player. Users No Longer Able…

CYBER NEWS

The Aztarna Tool Scans and Footprints Vulnerable Robots

According to a team of security researchers, “robotics industry has not seriously allocated effort to follow good security practices in the robots produced”. In their attempt to provide this industry with the right assessment tools, the team has created a…

CYBER NEWS

Blockchain in Space: One Giant Leap for NASA’s Cybersecurity

Blockchain and its many promises are definitely part of a modern ‘buzz’ surrounding the technology, but much of it is yet to come to fruition. Throw a stone in any direction, though, and you’ll hit some project or idea that…

CYBER NEWS

Yowai Botnet, Variant of Mirai, Exploits Known ThinkPHP Vulnerability

A known vulnerability dubbed ThinkPHP, which was disclosed and fixed in December last year, has been exploited for botnet propagation by a new Mirai variant, Yowai, a variant of Gafgyt known as Hakai. The discovery comes from Trend Micro, and…

CYBER NEWS

PoC of Chaos Exploit Code Jailbreaks iPhone X in Simple Attack

A proof-of-concept code for jailbreaking iPhone X has been created by a security researcher. The code reveals how two vulnerabilities can be chained to carry out a jailbreak operation, and the attack is quite simple, requiring an attacker to trick…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree