Cyber News - Page 98

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Parity Accident: $300 Million in Ether Lost for Good

Have you heard about the accidental freeze of $300 million worth of Ether that happened to the Parity wallet? Already called the biggest cryptocurrency loss in the short life of cryptocurrencies, this event is not a classical hack. The money…

CYBER NEWS
malware miners image

Top 5 Cryptocurrency Miners and How to Remove Them

Web-based scripts and downloaded viruses deliver cryptocurrency miners that take advantage of the available system resources. The criminal operators have resorted into making multiple versions that include varied functionality. Our article lists the top 5 cryptocurrency miners that are actively…

CYBER NEWS
Emotet banking Trojan Image

Emotet Trojan Protection Guide: How to Counter the Hacker Attacks

Ever since the Emotet Trojan was launched against computers worldwide a few years ago criminals have utilized in their attacks. Throughout the years its code has changed and removal attempts may not be always successful. Our article illustrates some of…

CYBER NEWS

AI Chat Bot to Fight Phishing E-mail Scammers by Wasting Their Time

A brilliant new technology was developed that may completely transform e-mails sent to victims by scammers. Named “Re:scam” the AI bot has a wide database of different personalities which aim to imitate how an actual human replies to an e-mail.…

CYBER NEWS

How the Cyber Threat Landscape Will Change In 2018

The only real constant in cybersecurity is change. With that in mind, let’s take a look forward at how that will come into effect in 2018. It’s been quite a year, hasn’t it? From the news that Russian hackers may…

CYBER NEWS
malware attacks image

The Most Persistent Malware Threats for Q3 2017 (Report Summary)

Computer security researchers released the Q3 2017 virus report indicating the latest threats which signals the intentions of the hackers that are behind the malware. The quarterly report gives insight on where the criminals are headed and how they have…

CYBER NEWS

Brand New IcedID Banking Trojan Changing the Threat Landscape

A new banking Trojan has been reported IBM X-Forse team – the IcedID Trojan. According to researchers, the piece emerged in the wild in September last year. This is when its first campaigns took place. The Trojan has sophisticated capabilities…

CYBER NEWS

1 in 1,000 Websites Is Running the Coinhive Miner

New statistics reveal that 2,531 of the top 3 million websites are running the Coinhive miner, which amounts to 1 in 1,000 websites. To no one’s surprise, BitTorrent websites are the main perpetrators. But they are not the only ones.…

CYBER NEWS

Chrome 64 Will Block Unwanted Redirects Starting Early 2018

Plausibly 1 out of 5 feedback reports from Chrome desktop users is about encountering unwanted redirects and content, Ryan Schoen from Google has shared. Because Google is always trying to improve user experience, Chrome will soon be blocking several types…

CYBER NEWS
quantum encryption image

Quantum Encryption in Security: How It Can Protect Us

Quantum encryption is one of the trendiest topics in cybersecurity practice and theory. In essence it uses the principles of quantum mechanism to secure message transmissions. One of the distinct advantage related to its use is the fact that it…

CYBER NEWS

14 Flaws Found in Linux Kernel USB Subsystem (CVE-2017-16525)

14 flaws in Linux kernel USB drivers were just disclosed by Google researcher Andrey Konovalov. The researcher found the vulnerabilities by deploying a kernel fuzzler known as syzkaller. The “14 vulnerabilities found with syzkaller in the Linux kernel USB subsystem……

CYBER NEWS
APT28 hackers image

Latest APT28 Malware Uses Microsoft Office DDE Vulnerability

The APT28 hacking group, also known as Fancy Bear, has initiated a global attack campaign using infected documents that refer to the recent terrorist attacks in New York. The criminal collective is using a recent vulnerability affecting a component of…

CYBER NEWS

The Security and Privacy Risks Associated with Implants

Medical and non-medical chips are entering our lives despite the controversy they are surrounded by. Unfortunately, many people willing to participate in such programs are forgetting the civil and privacy issues that must be addressed by system designers, innovators, regulators,…

CYBER NEWS
Tor Browser image

The TorMoil Tor Browser Vulnerability Leaks Real IPs, Update Now!

Security experts discovered the dangerous TorMoil Tor Browser Vulnerability which has recently been fixed in the latest version of the application. All users of the hidden network application are urged to apply the critical update as soon as possible. Related…

CYBER NEWS

Panda Zeus Trojan Delivered via Black-Hat SEO Campaign

One of the last times we heard of the Panda ZeuS Trojan was in June, 2017. Apparently, the banking Trojan has been used yet again in new malicious campaigns, as reported by Cisco Talos researchers. However, there is a difference…

CYBER NEWS

Immediately Upgrade to WordPress 4.8.3 to Avoid SQL Attacks

WordPress admins, beware. Websites running on WordPress version 4.8.2 and earlier should update immediately to version 4.8.3. Security researcher Anthony Ferrara has reported an SQL injection vulnerability in the platform allowing for websites to be taken over and exploited. Even…

CYBER NEWS

Silence Trojan – the Latest Carbanak-Like Malware Against Banks

Silence is the name of a new Trojan (and the hacking group behind it), discovered in September by Kaspersky Lab researchers. The targeted attack is set against financial institutions, and at this point its victims are primarily Russian banks, as…

CYBER NEWS

Smart Cybercrime: Phishing Kits Re-Used and Backdoored

Phishing campaigns drive most of the malicious attacks in the wild, and as it turns out, cybercriminals have found an efficient way to optimize their effect. A new study reveals that attackers often re-use phishing websites across multiple hosts by…

CYBER NEWS

Stolen Code Signing Certificates Are the Hottest Dark Web Trend

Dark Web news flash – digital code signing certificates cost way more than guns in underground markets. Apparently, a single certificate may cost up to $1,200, whereas a handgun is sold for about $600. According to researchers at Venafi, the…

CYBER NEWS

Cryptocurrency Miners on Google Play Posing as Apps

Cryptocurrency miners have successfully sneaked in the Google Play store. Researchers have found apps with malicious capabilities directed towards cryptocurrency mining. The apps were found to use dynamic JavaScript loading in combination with native code injection to bypass detection by…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree