Cyber News - Page 76

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

DanaBot Banking Malware Set Against US Banks

Security researchers at Proofpoint recently uncovered new DanaBot campaigns. The malware has been adopted by threat actors targeting Europe and North America. Previous targets included Australian organizations. Currently, DanaBot is set against financial organizations in the United States. DanaBot campaigns…

CYBER NEWS

CVE-2018-15702: TP-LINK TL-WR841N Router Vulnerability Found

A security researcher has discovered a critical TP-LINK TL-WR841N Router Vulnerability which affects all device owners. The bug is a collection of three issues that all can be exploited by hackers as presented in the demonstrated proof-of-concept code. At this…

CYBER NEWS

iOS Crypto Mining Detected, Redirecting Users to Coinhive Pages

New Kaspersky research indicates that the increasingly popular Roaming Mantis Group is testing a new monetization technique that involves the redirection of iOS users to Coinhive in-browser mining pages. Prior activities of this hacking group included the exploitation of vulnerable…

CYBER NEWS

Two Complex iOS 12 Passcode Bypasses Expose Contacts and Photos

iOS 12, the latest version of Apple’s mobile operating system which was released in the middle of September, is already facing a serious security problem. Apparently, someone has found a way to go around its lock screen security to access…

CYBER NEWS

CVE-2018-17780: Telegram Bug Found to Leak IP Addresses During Calls

A new Telegram bug has been recently discovered which leaks the public IP addresses of the callers. It appears that the reason for this is a default configurations option which has been found to cause this behavior. CVE-2018-17780: Serious Telegram…

CYBER NEWS

CVE-2018-0896 Used by Latest GandCrab Versions (GANDCRAB v5.0.1)

Judging by the speed at which new iterations are introduced into the wild, whoever is behind the GandCrab ransomware is not going to stop any time soon. The ransomware was just updated in two new versions – GANDCRAB v5.0.1 and…

CYBER NEWS

Hackers Exploit IoT Medical Devices via Unusual Methods

The IoT medical devices have long been one of the most popular targets by computer hackers. In the past several years experts have warned both vendors and users about the vulnerabilities associated with it. Iot Medical Devices Continue to Be…

CYBER NEWS

50M Facebook Users Exposed by Security Bug Were Asked to Re-Log-In

Were you unexpectedly logged out of your Facebook session just this morning (28th September, 2018)? Well, there is a reason for that, and it had to do with a brand new security vulnerability in Facebook, BBC reported. New Security Flaw…

CYBER NEWS

The Seven Most Popular Subjects in Phishing Emails

Phishing has long been a crucial part of attackers’ arsenal. The technique is often deployed against companies and their employees, tricking them into clicking on the provided links and thus initiating various malicious campaigns. To counter the success of phishing,…

CYBER NEWS

The Torii Botnet Is A Sophisticated Hacking Weapon

The Torii botnet has been discovered in an ongoing target campaign uncovering some of its distinctive features. An analysis has been made revealing that it behaves in a very different way to other popular botnets. Torii Botnet Relies on Distinctive…

CYBER NEWS

It’s Final: Microsoft Ends Support for Skype Classic on November 1

In July, Microsoft made the announcement that it’s about to discontinue Skype Classic on September 1st. However, because of the negative feedback, this date got delayed. Unfortunately, the delay is also going to end soon, as Microsoft is expected to…

CYBER NEWS

Lojax Is the First UEFI Rootkit Used in a Cyberattack

A team of security analysts discovered a dangerous new weapon used by hackers — the Lojax UEFI rootkit which apparently is the first of it kind to be used against users. The collected information about it shows that it is…

CYBER NEWS

The VPNFILTER Trojan Has Been Updated With New Advanced Features

The VPNFILFER Trojan has been updated by the developers behind it with new modules that make it an even more dangerous threat. The detailed security analysis shows that in the hands of experienced hackers it can cause significant damage to…

CYBER NEWS
Google Chrome image

Chrome 70 Introduces Sign-In Toggle, Lets You Delete ALL Cookies

Just a couple of days ago, privacy-savvy eyes noticed that Chrome 69 keeps Google cookies even when the user specifically asks it to delete all cookies. What exactly happens when the user tries to clear all cookies from Chrome 69?…

CYBER NEWS

Windows 10 October “Redstone 5” Update – What Will It Have

Windows team has been gearing up it’s 10th version for a new update, whose main goal is to introduce new features and remove some of the older ones, like the discussed for quite some time Snip tool. Will the update…

CYBER NEWS

Czech Android Trojan Impersonates QRecorder App

A new Czech Android Trojan has been detected which has been found to impersonate the QRecorder app. A statement from the police shows that the hacker or group behind it has already stolen over 78 000 Euro from victim accounts.…

CYBER NEWS

Twitter AAAPI Bug Shared User Messages with Unauthorized Parties

Twitter just fixed a vulnerability that may have shared direct messages (DMs) and protected tweets of some users with developers who were not authorized to access the information. It appears that the bug is related to Twitter’s Account Activity API…

CYBER NEWS

All Wi-Fi Routers Found to Be Affected by Unfixable Vulnerability

Modern Wi-Fi routers have been found to be vulnerable to a dangerous vulnerability due to a technical design issue. A research team uncovered that the problem lies within the specifications of the network protocols and until changes into them are…

CYBER NEWS
Preventing DNS Leaks

Protecting Yourself from Identity Theft by Preventing DNS Leaks

What Is Identity Theft Exactly? Identity theft is a term that is used to refer to any kind of scam, deception, or activity that leads to loss of your personal data, including loss of passwords, username, credit card details, banking…

CYBER NEWS

Hide and Seek Iot Botnet Now Set Against Android Devices

The Hide and Seek IoT botnet has recently been updated by its creators to now target Android devices as well. The security analysis reveals that the newly released is even more dangerous than before. Our article sums up the changes…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree