Cyber News - Page 68

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Facebook Research VPN Pays Teens $20 to Get Root Access to Devices

Reportedly, Facebook has been paying people of a certain age group to install a data harvesting VPN tool known as the “Facebook Research” VPN, but also referred to as Project Atlas. The tool has been offered to iOS and Android…

CYBER NEWS

FaceTime Bug Discovered by 14-Year-Old, Apple Is Facing Lawsuit

Regardless of the fact that you own or don’t own an Apple device, you must have heard about the serious security bug in the FaceTime app. It is all over the news, and it should be. The FaceTime App Bug…

CYBER NEWS

Facebook Messenger, Instagram, WhatsApp to Become One Platform

Facebook is planning to unify Facebook Messenger, Instagram and WhatsApp into one messaging platform, the New York Times recently reported. To be more precise, the plan is to keep the apps separate but unify their technical and software architecture. This…

CYBER NEWS

Microsoft Discontinues Metadata Service in Windows 7’s Media Player

Researchers that closely follow Microsoft’s movements have noticed a new support document which, apparently, was quietly published. The document says that the company is abandoning a feature used in Windows Media Center and Windows Media Player. Users No Longer Able…

CYBER NEWS

The Aztarna Tool Scans and Footprints Vulnerable Robots

According to a team of security researchers, “robotics industry has not seriously allocated effort to follow good security practices in the robots produced”. In their attempt to provide this industry with the right assessment tools, the team has created a…

CYBER NEWS

Blockchain in Space: One Giant Leap for NASA’s Cybersecurity

Blockchain and its many promises are definitely part of a modern ‘buzz’ surrounding the technology, but much of it is yet to come to fruition. Throw a stone in any direction, though, and you’ll hit some project or idea that…

CYBER NEWS

Yowai Botnet, Variant of Mirai, Exploits Known ThinkPHP Vulnerability

A known vulnerability dubbed ThinkPHP, which was disclosed and fixed in December last year, has been exploited for botnet propagation by a new Mirai variant, Yowai, a variant of Gafgyt known as Hakai. The discovery comes from Trend Micro, and…

CYBER NEWS

PoC of Chaos Exploit Code Jailbreaks iPhone X in Simple Attack

A proof-of-concept code for jailbreaking iPhone X has been created by a security researcher. The code reveals how two vulnerabilities can be chained to carry out a jailbreak operation, and the attack is quite simple, requiring an attacker to trick…

CYBER NEWS

New Anti-Ransomware Tool Prevents, Detects and Responds to Attacks

A new anti-ransomware solution has been developed by Cohesity, a privately held enterprise storage company headquartered in San Jose, California. The solution offers a set of capabilities meant to prevent, detect and respond to ransomware cyberattacks. According to the company’s…

CYBER NEWS

Microsoft’s Bing Blocked in China Following a Government Order

Microsoft’s search engine, Bing, has been blocked by China. This has been confirmed by Chinese users who complained about not being able to use the search engine. Bing is yet another service that has been blocked by the Chinese government…

CYBER NEWS

URLhaus Takes Down 100,000 Malware Sites within 10 Months

URLhaus is a cybersecurity project launched by the well-known abuse.ch non-profit organization in Switzerland. The project is focused on sharing malicious URLs, and it just succeeded in taking down nearly 100,000 websites exploited for malware distribution. The take-down operation requires…

CYBER NEWS

55 Percent of Apps Are Widely Outdated, Including Skype and VLC Player

Running outdated software hides huge risks but many users (both home and enterprise) do it anyway. According to a new security report, 55 percent of applications installed on machines worldwide are outdated, meaning they have not been updated to the…

CYBER NEWS

CVE-2019-3462: Linux APT Package Manager Can Be Hacked Remotely Due to Critical Flaw

A dangerous flaw has been discovered in the APT package manager for Linux distributions which allows hackers to remotely hack target machines. The issue is being tracked in the CVE-2019-3462 advisory which gives further information about the vulnerability. The affected…

CYBER NEWS

MySQL Design Flaw Could Allow Malicious Servers to Steal Files

A design flaw has been discovered in the file transfer interaction between a client host and a MySQL server. The bug allows threat actors operating a malicious MySQL server to obtain any data the connected client has read access to.…

CYBER NEWS

Vulnerabilities in ThreadX Firmware for Wi-Fi Chips Discovered

Several vulnerabilities have been discovered in the firmware of a Wi-Fi chipset, meaning that a variety of laptop and smart devices are affected. The exploit can happen without user interaction, claims Embedi researcher Denis Selianin. With this research, I’m going…

CYBER NEWS

CVE-2018-15439: Cisco Small Business Switches Vulnerable

Cisco Small Business Switches are vulnerable to a remote attack where commands with admin privileges can be executed. The vulnerability is tracked under CVE-2018-15439, and it could allow an unauthenticated, remote attacker to bypass the user authentication mechanism of an…

CYBER NEWS
7-step-guide-protecting-confidential-business-data

A 7-Step Guide to Protecting Confidential Business Data at Work and at Home

It is very critical for businesses to protect confidential data that they collect and retain such as customer information, legal contracts, bank details, and other important documents. If not handled properly, data can be compromised which can cause irreversible damages…

REVIEWS

Top Security and Privacy Linux Distributions in 2019

There are many specialist Linux distributions that are designed with security in mind. Even though there are universal distributions that cater for practically all usage many administrators, concerned citizens and penetration testers usually choose specific ones. This article will reveal…

CYBER NEWS

Magecart Hackers Insert Skimming Code Into a Third-Party JavaScript Library

Remember Magecart? In November last year, security researchers discovered that the the infamous malware, known for harvesting credit card details from checkout forms, [wplinkpreview url=”https://sensorstechforum.com/sites-magecart-malware-reinfected/”]could re-infect even after clean-up. Now, Magecart is active once again in notorious campaigns in which…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree