Cyber News - Page 94

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Consumers Using Mobile Banking Apps at Greater Risk of Financial Loss

Mobile banking apps are a convenience but they also pose a risk to users. A new global research carried out by Avast shows that consumers using mobile banking apps are at a greater risk of falling victim to theft of…

CYBER NEWS

Coldroot macOS RAT and Keylogger Goes Undetected for Years

Coldroot is a remote access Trojan (RAT) that has been distributed on MacOS machines without being detected for quite some time. Researchers say that the malware is cross-platform and that it could successfully drop a keylogger on MacOS prior to…

CYBER NEWS
EU GDPR REGULATIONS IMAGE

What Are the GDPR Regulations and How They Will Affect Internet Users

The GDPR (short for General Data Protection Regulations) rules are about to come in effect in two months time. Our article reveals what do they mean for computer users worldwide and how the regulations will impact the IT industry as…

CYBER NEWS

uTorrent Vulnerability Could Be Exploited by Any Website

One of the most popular BitTorrent apps – uTorrent – has been found to be vulnerable to easily exploited flaws that could allow hackers to perform a variety of malicious actions. More specifically, two versions of the app are vulnerable…

CYBER NEWS
Microsoft Word image

Cryptocurrency Theft Now Possible via Microsoft Word Documents

Security analysts have reported a worrying new discovery — cryptocurrency theft is now possible due to a new feature added in Microsoft Word which allows users to embed multimedia elements. Microsoft have apparently tried to ease the creation of interactive…

CYBER NEWS

Tesla’s Amazon Cloud Hacked in Cryptocurrency Mining Attack

A hack has happened at Tesla – the company’s cloud has been abused to mine cryptocurrency, as reported by RedLock researchers. The report is focused on cloud security. Related Story: How to Steal a Tesla Car, the Android App Edition…

CYBER NEWS

Microsoft Fails to Fix Edge Bug on Time – Google Makes It Public

Google has revealed details about a flaw in Microsoft Edge browser after Microsoft missed the deadline for fixing it. Google had previously notified Microsoft about the vulnerability in the browser via Project Zero, giving them the usual 90-day disclosure deadline.…

CYBER NEWS

Spam in 2017: Cryptocurrency Scams Sneaked in the Inbox

A new report by Kaspersky Lab has revealed the most common type of spam messages that were being delivered in the wild in 2017. Apparently, the share of spam in mail traffic decreased to 56.63 percent, which is 1.68 percent…

CYBER NEWS
Lazarus Group image

Lazarus Group Hackers Are Behind a Dangerous New Phishing Scam

The infamous criminal collective known as the Lazarus Group have been spotted behind a worldwide phishing scam. They are among the most experienced hacker groups that are infamous for coordinating mass attacks against high-end targets. The current campaign is focused…

CYBER NEWS

Microsoft Vulnerabilities Overview: 685 Flaws Reported in 2017 Alone

The number of vulnerabilities in Microsoft products has been growing steadily during the last five years, a new Microsoft Vulnerabilities Report by Avecto reveals. More specifically, in 2013, 325 vulnerabilities were discovered and reported, and currently their number is 685.…

CYBER NEWS

Severe DLL Hijacking Flaw in Skype Won’t Be Patched by Microsoft

As of January, 2018, Skype has been used by approximately 300 million users, according to statistics by Statista. Even though Skype is not the most popular and widely used messenger, its user base still is quite big. So any news…

CYBER NEWS

Zero-Day Flaw in Telegram Exploited to Mine Zcash and Monero

Malicious actors are constantly coming up with new ways of exploiting the various cryptocurrencies available to users. Kaspersky Lab researchers just reported a zero-day flaw discovered in the Telegram Desktop app that could be used as an intermediary for hackers…

CYBER NEWS
Computer Virus Design 2018

Computer Virus Design in 2018: Essential Malware Components

Computer viruses are rapidly evolving as hackers are devising new types of malware and delivery mechanisms. Despite the fact that most ordinary computer users perceive them as single executable files that execute a predefined script behavior, the current attack campaigns…

CYBER NEWS
Cryptocurrency miners image

Cryptocurrency Miners Infect Government Sites Worldwide

Cryptocurrency miners are some of the most dangerous malware that are currently being directed against targets worldwide. Attack campaigns carrying them have the capability of causing much damage to the target hosts. A recent uncovered exploit has led to the…

CYBER NEWS

Blockhain Abuse: Next-Generation Malware Practices

As more and more software developers start to rely on blockchain networks to start their future projects, so are the possibilities to intrude into the devised decentralized infrastructure. Computer hackers are actively seeking ways to weaken the security of the…

CYBER NEWS
Advanced Hacker Tools image

Advanced Hacker Tools — Underground Weapons of Mass Destruction

Computer criminals attempt to cause intrusions and damage networks of high-profile targets and millions of end users daily. However while most attacks rely on simple penetration testing and automated script attacks there are also advanced hacker tools that have the…

CYBER NEWS

Google Chrome Will Mark HTTP Pages As Not Secure

Google just announced that any web page lacking a security certificate (HTTPS) and being served over HTTP is going to be marked as unsecure by the Chrome browser. The change is expected to take place in July this year. HTTP…

CYBER NEWS

Hospitals Are the Latest Target of Cryptocurrency Miners

During the past couple of years, ransomware was preferably targeting medical institutions and hospitals. Multiple health organizations were hit and were left with no choice but to pay the demanded ransom. With the shift of malicious trends to cryptocurrency miners,…

CYBER NEWS

7.8 Billion Records Compromised via Data Breaches in 2017 Alone

2017 was one of the worst years for cybersecurity experts, with the increasing number of hack attacks and various data breaches. More specifically, researchers were able to estimate that there were 5,207 breaches reported last year, a new report by…

CYBER NEWS
Octoly private data image

Octoly Marketing Service Leaked Private Data via Amazon Service

The marketing agency Octoly has erroneously exposed a lot of personal data belonging to their customers. The leak happened due to a misconfiguration in the Amazon S3 Simple Storage Service bucket which hosts the clients data. The security reports indicate…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree