Cyber News - Page 95

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Onion.to Tor-to-Web Steals from Ransomware Operators and Victims

Stealing from Ransomware Operators and Ransomware Victims? Mission Possible, Says Onion.to Tor-to-web Proxy Service Security researchers at Proofpoint have reported that the operators of a Tor proxy service were detected replacing Bitcoin addresses on ransomware payment websites. This means that…

CYBER NEWS
Hide 'N Seek IoT Botnet image

The Hide ’n Seek IoT Botnet Uses P2P to Target Devices

Security analysts uncovered a new worldwide malware threat — the Hide ‘N Seek IoT botnet which uses a custom-built P2P communication module to spread itself. The infections are rapidly increasing and it appears that separate attacks are being launched against…

CYBER NEWS
Lenovo Fingerprint Security image

Lenovo Fingerprint Security Can Be Bypassed via a Hard-Coded Password

Computer security researchers uncovered a dangerous security vulnerability in the Lenovo Fingerprint Manager Pro app. According to the reports the fingerprint security authentication can be easily bypassed by malware users by inputting a hard-coded password. Lenovo Fingerprint Manager Pro Can…

CYBER NEWS
wordpress virus image

“Cloudflare.solutions” Malware Found on Hundreds of WordPress Websites

At least 2,000 WordPress websites have been compromised by a piece of malware designed to act like a cryptocurrency miner and a keystroke logger. The malware leverages the name of Cloudfare and was discovered several months ago by Sucuri researchers.…

CYBER NEWS

The Coincheck Heist Highlights What Is Wrong with Crypto Exchanges

The world’s biggest cryptocurrency theft (for now) is already a fact. Coincheck, the leading Bitcoin and cryptocurrency exchange in Asia as advertised on their website, has lost $530 million worth of cryptos. The theft has already caused a lot of…

CYBER NEWS

Chrome 64: Better Ad-Blocker, 53 Security Fixes, Spectre Patch

Chrome 64 for Windows, Mac and Linux has just been made available by Google. The latest version of the browser features a more powerful pop-up blocker, 53 security fixes, and further mitigations against the Spectre flaw. At the end of…

CYBER NEWS
Tinder logo

Tinder Bug Exposes Users Private Data to Strangers

The popular Tinder dating app has been identified with two serious vulnerabilities. Security experts identified a dangerous Tinder bug that can expose the swipes and matches of users to strangers. According to the provided information the flaw has been identified…

CYBER NEWS
Masuta botnet image

Mirai-Based Masuta IoT Botnet Spreads in a Worldwide Attack

Security analysts discovered a new dangerous botnet based on Mirai that is used in a worldwide attack campaign. It is called Masuta and it has already impacted a lot of devices, at the moment it is believed that an experienced…

CYBER NEWS

Cryptocurrency and the Fight Against the Net Neutrality Repeal

With the vote against net neutrality, cryptocurrencies have had to have a rethink what they can do to ensure their services will not be affected by the larger ISPs. It is the case that there could be a conflict of…

CYBER NEWS

Dark Caracal Spyware Operating at a Global Scale

A string of new spyware has been detected by security researchers. Dubbed Dark Caracal, the campaigns seem to be operating out of a government building in Lebanon. The campaigns have attacked thousands of victims in at least 21 countries. The…

CYBER NEWS

Satori.Coin.Robber Botnet May Be Stealing Your Ethereum

The infamous Satori botnet has once again been caught in the wild, this time targeting rigs mining for the Ethereum cryptocurrency. Researchers dubbed this latest iteration Satori.Coin.Robber. Satori is a botnet that exploits a flaw in Huawei and a bug…

CYBER NEWS

Skygofree Android Trojan – the Most Sophisticated Mobile Spyware Ever

Researchers recently came across a piece of Trojan that deserves lots of attention due to its highly sophisticated spying capabilities. The Trojan is named Skygofree, after one of the domains it used, and its target is Android. Skygofree was discovered…

CYBER NEWS

RubyMiner Malware – How to Detect and Remove It from Your Computer

This article has been created in order to explain what is the RubyMiner malware threat and how to remove it from your computer. New cryptocurrency miner, known as RubyMiner has been detected by malware researchers. The virus aims to mine…

CYBER NEWS

Data Security Tips and Pitfalls to Know About in 2018

In 2017 we saw international corporations, public figures, and individuals alike become the victims of major data security breaches. Most prominently, perhaps, was the leaking of nearly 150 million American’s social security numbers by Equifax. There were also major breaches…

CYBER NEWS

BlackWallet App Compromised, 400,000 USD In Lumens Stolen

The BlackWallet browser-based wallet application has been compromised and 400,000 USD in user funds (in the Stellar Lumen cryptocurrency) were stolen from it. It’s still unknown who is behind this attack. To perform the attacks, hackers hijacked the DNS servers…

CYBER NEWS

Malware Trends 2018: How Is the Threat Landscape Shaping?

2018 is already here, and it has started pretty strong for cybersecurity with the disclosure of the Meltdown and Spectre vulnerabilities. However, the question still remains – what will this year bring in terms of malware coding, attacks on enterprises…

CYBER NEWS
WhatsApp and Signal security image

WhatsApp and Signal Bugs Expose Encrypted Group Chats

A dangerous security bug has been identified in the popular WhatsApp and Signal messenger aps that allows hackers to covertly gain access to encrypted group chats. The experts that discovered the exploit reveals that the problem lies in the intermediate…

CYBER NEWS

Hackers Are Getting Smarter – But What Can You Do About It?

The image of a hacker as some manchild in his mom’s basement is a thing of the past. Today’s criminals are smarter, savvier, and more professional than ever. How can you defend against them? 73% of Americans have at some…

CYBER NEWS

RIG EK Currently Delivering Monero Miner to Unsuspecting Users

Until recently, exploit kits were mostly deployed to distribute ransomware. However, following the current trend in worldwide infections, cybercriminals have started using exploit kits for the distribution of cryptocurrency miners. Exploit Kits and Drive-By Downloads Actively Used in the Distribution…

CYBER NEWS
Turla hackers image

Turla Hackers Employ Mosquite Backdoor Against Diplomats

The Turla Hackers are a famous criminal collective that are widely known for executing complex attacks against large companies and government institutions. Security experts have detected that they are responsible for a large-scale ongoing hacking campaign against embassies and consulates…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree