Cyber News - Page 85

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

U.S. Is the Nation Most Susceptible to Cyberattacks

No one is safe against hacking. However, users and organizations based in certain countries appear to be more vulnerable to cyberattacks than others, as is the case with the United States. It appears that the U.S. is the nation which…

CYBER NEWS
Six Tools to Maximize Cyber Threat Prevention

Six Tools to Maximize Cyber Threat Prevention

Today’s web hackers are ever more advanced and are working hard to come up with new techniques and weapons to infiltrate networks. As attacks get more sophisticated, security providers are responding to these evolving threats. There are a lot of…

CYBER NEWS

Fake Adult Sites and Media Players Will Get You Adware and PUPs

If you have downloaded software, mostly freeware, you have definitely experienced adware, or the unexpected, intrusive pop-up advertisements that come out uninvited on your screen. PUPs are annoying and that’s a fact no one can deny, but they can also…

CYBER NEWS

Gentoo Linux GitHub Hacked via Password Guessing

Following the recent Gentoo Linux hack the distribution’s security team started to investigate how the intrusion was made. The published report showcases exactly how the criminals have been able to break into their GitHub accounts and embedded malicious code. The…

CYBER NEWS

Stylish Extension Stole All Your Browsing History from Chrome and Firefox

The Stylish extension used by many Mozilla Firefox and Google Chrome users has been removed from their plugin repositories due to security concerns. A dangerous privacy leak has been exposed by a blogger which reported that the plugin reports private…

CYBER NEWS

Malicious Windows 10 Shortcuts Allow Code Execution

Computer hackers have devised a new way to infect target hosts by using malicious Windows 10 shortcuts. This strategy is being used at large by numerous hacker groups and individual hackers as it is relatively easy to implement. The malicious…

CYBER NEWS

Download Bomb Bug Affects Chrome, Firefox Browsers

Have you heard of the so-called “download bomb” bug which occurs when hundreds or even thousands of downloads are initiated? The result of this technique is that the affected browser stops functioning properly as it typically freezes on a specific…

CYBER NEWS

Facebook Admits It Gave Access to User Data to 61 Tech Companies

Facebook is once again facing public opinion as it admitted that it granted special access to users’ data to 61 technology companies. A 747-page document has been handed over to the US House of Represantives’ Energy and Commerce Committee on…

CYBER NEWS

Samsung Devices Randomly Sending Owners’ Photos to Contacts

Do you have a Samsung smartphone? There is something you need to know. Some devices are randomly sending photos taken with the camera to contacts in the address book without permission. The problem affected Galaxy S9 and S9+ devices, but…

CYBER NEWS
Bookworm Windows Search Service Vulnerability image

Bookworm Windows Search Service Vulnerability Still Not Patched

A dangerous threat has recently been identified by security researchers as the Windows Search service vulnerability. Its alternative name is Bookworm and while it has been reported to Microsoft, the company has not yet patched the issue. All About The…

CYBER NEWS

Facebook Bug Unblocked Your Blocked Friends for a Week

Facebook has notified 800,000 users whose privacy has been compromised by a “blocked” bug. It appears that blocked individuals on Facebook and Messenger of the affected users were temporarily unblocked. Facebook also has some new API restrictions aimed at protecting…

CYBER NEWS

Crypto Investors on Slack and Discord: Beware the OSX.Dummy Malware

Security researchers recently found out how attackers are using macOS malware known as OSX.Dummy to target cryptocurrency investors using the Slack and Discord chat platforms. The chat platforms are abused by cybercriminals who are impersonating admins to trick users. Related…

CYBER NEWS

LTE (4G) Communication Standard Can Be Hacked, Researchers Prove

A research that was just published reveals how attacks against the mobile communication standard LTE can occur. LTE can be compromised in three attacks where an attacker collects meta- information about the user’s traffic, among other things. More specifically, the…

CYBER NEWS

GitHub Account of Gentoo Linux Hacked, Refrain from Using Its Code

Apparently, the GitHub account of the Gentoo Linux distribution has been hacked, as evident by an announcement published on the distro’s official website. The hack took place on June 28 when “unknown individuals” gained control of the GitHub Gentoo organization.…

CYBER NEWS

Adidas Data Breach: Customers of the American Website Affected

Adidas customers should be aware of a data breach that affects consumers who made purchases on adidas.com/US. There is still no sufficient information about the incident but the company has acknowledged that an authorized party claims to have acquired data…

CYBER NEWS

Rancor Hackers Use PLAINTTEE and DDKONG Malware in Asian Attacks

The criminal collectives are becoming active against computer networks worldwide. Experts have detected a new wave of attacks that are being orchestrated by the Rancor hackers against various computers located in Asia leveraging the PLAINTEE and DDKONG malware families. This…

CYBER NEWS

CVE-2018-0296 Severe Flaw in Cisco ASA and Firepower Currently Exploited

A new vulnerability, CVE-2018-0296, rated high-severe is affecting Cisco ASA and Firepower security appliances. The flaw is being exploited in the wild after an exploit of it showed up online a few days ago. CVE-2018-0296 Official Description A vulnerability in…

CYBER NEWS
TLBleed Vulnerability image

TLBleed Vulnerability Affects Intel Processors Following Meltdown

Following the sequence of dangerous vulnerabilities identified in Intel processors, researchers have found a yet another dangerous bug. The latest issue has been identified as the TLBleed vulnerability which is currently regarded as one of the critical problems with contemporary…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree