Cyber News - Page 81

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

CVE-2017-7150: Mac OS X Warning Prompts Can Be Easily Bypassed

Mac OS X computers have been found vulnerable due to a report indicating that warning prompts can be easily bypassed. A demonstration has shown how this can be used by hackers in virus infections. The vulnerability is classified as a…

CYBER NEWS

Intel Processors Affected with Foreshadow Speculative Execution Flaws

Security experts discovered three new vulnerabilities affecting Intel processors that appear to be speculative execution flaws called Foreshadow. This is the code name under which has been assigned to the bugs, appearing to be yet another problem that affects general…

CYBER NEWS

Highly Choreographed ATM Cashouts Expected to Hit Banks

Just a few days ago, security researcher Brian Krebs reported that the FBI is warning banks of cybercriminals about to carry out a “highly choreographed, global fraud scheme known as an “ATM cashout,” in which crooks hack a bank or…

CYBER NEWS

CVE-2018-8414, CVE-2018-8373 Fixed in August 2018 Patch Tuesday

Microsoft has released their latest wave of updates in the August 2018 Patch Tuesday addressing some serious vulnerabilities. Among them are issues related to the remote code execution and weaknesses exploited by popular viruses and Trojans to gain entry to…

CYBER NEWS

Facebook Nike Shoes Scam of 2018 Shows History Repeats Itself

A new scam wave has started to hit the world and this time it is a big one, advertising users to visit phishing web pages that aim to steal their sensitive information. We at Sensors Tech Forum have covered malware…

CYBER NEWS

CVE-2018-0131 in Cisco IOS and IOS XE Switch, Router Software Patched

A new Cisco patch is available, addressing a flaw in IOS and IOS XE switch and router software. The patch has been released in regards of a disclosure of security flaw (known as CVE-2018-0131) in the Internet Key Exchange (IKE)…

CYBER NEWS

Faxploit: Fax-Enabled Machines Easily Hacked Using a Fax Number

A new hack attack endangering all-in-one printer-fax machines was revealed by Check Point researchers during this year’s DEF CON. The hack, smartly dubbed Faxploit, was tested on HP machines but similar attacks could apply to other vendors and fax-enabled products…

CYBER NEWS

Android Man-in-the-Disk Attack Can Expose Apps & User Data

Security experts discovered a new Android infection mechanism called the Man-in-the-Disk attack. It takes advantage of a design issue found to be with the operating system itself that takes advantage of the external storage access. Abuse of this possibility can…

CYBER NEWS

CVE-2018-3110: Critical Vulnerability in Oracle Database Disclosed

Another day, another vulnerability that needs to be patched as soon as possible. Oracle has informed of a security flaw that affects Oracle Database versions 11.2.0.4 and 12.2.0.1 running on Windows. Technical Details about CVE-2018-3110 The vulnerability, which is given…

CYBER NEWS

Mobile PoS Vulnerabilities Impact Paypal, Square, SumUp

An alarming discovery was recently made during the Black Hat conference held in Las Vegas. Security researchers from Positive Technologies reported that vulnerabilities in mPOS (mobile Point-of-Sale) machines allow attackers to take over customer accounts and steal credit card data.…

CYBER NEWS

Social Mapper Uses Facial Recognition to Track Users on Social Media

Social Mapper is a new open source intelligence tool that uses facial recognition to correlate social media profiles. The tool has been developed by Trustwave, a company that provides ethical hacking services. Apparently, the tool has already been tested in…

CYBER NEWS

How Is GDPR Creating Better Career Opportunities in Cybersecurity?

Are you one of those infosec professionals looking for a change? Well, this article is for you to explore a new and flourishing career in cybersecurity. This is the best time to challenge your IT skills and specialize in the…

CYBER NEWS

CVE-2018-5740 BIND Vulnerability Could Cause DoS Attacks

A warning has been issued by the Internet Systems Consortium (ISC) about a severe vulnerability that could be leveraged in DoS attacks in the open-source BIND software. The vulnerability was discovered by security researcher Tony Finch of the University of…

CYBER NEWS

WhatsApp Vulnerability Allows Hackers to Manipulate Messages

A noteworthy WhatsApp vulnerability allows malicious users to infiltrate group chats and manipulate the messages of individual users. The hackers can take advantage of the malware method and abuse it to intercept and change contents of messages sent in private…

CYBER NEWS

Bitcoin ATMs at Risk of Malware Sold on the Dark Web

Bitcoin owners that use Bitcoin ATMs should be extra careful. Security researchers have uncovered malware that is specifically crafted to target these ATMs. This malware is being traded on the Dark Web, and its price is quite high. The shift…

CYBER NEWS

Ramnit Trojan Botnet Launched, 100 000 Computers Already Infected

The Ramnit malware (also known as Virus.Ramnit.J) as one of the most dangerous banking Trojans is known for causing numerous infections worldwide. The newly discovered Black botnet has been found to be made by the same collective. Our article gives…

CYBER NEWS

Snapchat Source Code Leak on GitHub Caused by Bad iOS App Update

Part of the source code of Snapchat was leaked and made public on GitHub. Apparently, an iOS update in May exposed a small amount of the app’s source code. However, Snapchat was able to identify the mistake and rectify it…

CYBER NEWS

Hackers Target US Payment Processors via BGP Hijacking Attacks

Us payment processors report that they are being targeted by hackers using BGP hijacking attacks. This is a complex method used by experienced groups as it requires both resources and knowledge to execute one directly. BGP Hijacking Attacks Used Against…

CYBER NEWS

WannaCry Outbreak Could Cost TSMC $170 Million

A computer virus outbreak on the evening of August 3 compromised Taiwan Semiconductor Manufacturing Co (TSMC), the world’s largest dedicated independent semiconductor foundry. The outbreak affected a number of computer systems and fab tools in Taiwan. The virus that hit…

CYBER NEWS

Proof-of-Concept UBoat Botnet Replicates Real-World Weapons

The UBoat botnet is a proof-of-concept botnet that has been designed primarily for penetration testing and educational purposes. The author behind it has specifically stated that the main purpose behind it is to help security engineers understand how botnets can…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree