Cyber News - Page 99

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Boosting Security by Moving to the Cloud

The Cloud has proven to be a great boon to data preservation for a number of companies operating as of late. As with most technology in the midst of its evolution, the Cloud still needs improvement; its sharing capabilities and…

CYBER NEWS

Reaper Botnet Malware – What Is It and How to Protect IoT Devices

New Botnet malware has been detected by malware researchers to attack IoT (Internet of Things) devices. The malware aims to compromise whole networks of IoT devices by using DdoS (denial of service) type of attacks. It also enlists the IoT…

CYBER NEWS
Magniber Ransomware image

A New Threat Emerges: Magniber Ransomware Hits South Korea

Hackers are utilizing the malevolent Magnitude Exploit Kit to distribute the new Magniber ransomware to targets in South Korea. Previously the kit has been used to deliver high-impact malware, namely the majority of Cerber ransomware strains on a global scale.…

CYBER NEWS
WaterMiner Monero Miner image

WaterMiner Monero Miner Is the Newest Cryptocurrency Malware

The dangerous trend of creating new ways to infect client computers has led to the development of WaterMiner ‒ an evasive malware Monero miner. A detailed security reveals how this malicious software takes advantage of weak security and takes advantage…

CYBER NEWS

Dark Web Trends: Zcash, Monero and Etherium Becoming Popular

Europol released a detailed report on the dark web hacker underground networks which states that criminals are preferring to use Zcash, Monero and Etherium over Bitcoin in some cases. The rising trend of using the alternative digital currencies means that…

CYBER NEWS

Microsoft Finds RCE Bug in Google Chrome (CVE-2017-5121)

Microsoft discovered a critical vulnerability in the Google Chrome web browser which is tracked under the CVE-2017-5121 advisory. The details pertaining in its discovery reveal some of the issues that web browsers face in today’s world where hacker attacks and…

CYBER NEWS
Krack Attack image

Wi-Fi Encryption Protocol WPA2 Now Unsafe Due to Krack Attack

Computer users beware, your Internet access may no longer be safe as security experts discovered that the most popular Wi-Fi encryption protocol WPA2 can be cracked. The discovery became popular as the Krack attack which is short for Key Reinstallation…

CYBER NEWS
AdBlock Plus image

Fake AdBlock Plus Extension Plagues the Google Chrome Store

Google’s own Chrome Web Store repository has been found to feature a counterfeit AdBlock Plus extension which infected thousands of users. This is a yet another incident involving Google Chrome’s repository which is being abused constantly by computer hackers. Chrome…

CYBER NEWS
Microsoft Office image

Old Microsoft Office Feature Can Be Used to Launch Virus Attacks

An old Microsoft Office can be used as an effective way to launch malware attacks against users worldwide. The discovery has been made by a team of security researchers that identified the hacker strategy. Related Story: Hackers Devise Microsoft Office…

CYBER NEWS
DoubleLocker android ransomware image

DoubleLocker Is an Android Ransomware That Locks down Victim Devices

Mobile users beware, the DoubleLocker Android ransomware can encrypt victim devices and change the associated PIN codes. At the moment a global attack wave is targeting mobile users using different delivery tactics. DoubleLocker Android Ransomware Detected Researchers from leading anti-virus…

CYBER NEWS
Cryptocurrency Miners image

Millions of Computers Infected with Cryptocurrency Miners

Reports indicate that a new hacker attack wave is being used against computer victims worldwide by distributing cryptocurrency miners via malicious scripts on websites. One of the most famous examples are some of the mirrors of the Pirate Bay torrent…

CYBER NEWS

6,300 Dark Web Marketplaces Are Selling Ransomware

Computer security researchers identified that the current prices of most Dark Web ransomware strains are becoming higher as beginner hackers flock to custom-made solutions. Dark Web Ransomware Is in High Demand In the last few years ransomware viruses are one…

CYBER NEWS

Facebook and Twitter Flooded with 437,165 Financial Scams

Scams that are after credit card and financial information have doubled in the past year, new report shows. Such scams are distributed across social media websites. Despite their abundance and frequency, it appears that the number of hacker groups behind…

CYBER NEWS

PornHub Hacked to Serve Malicious Ads to Users for over a Year

Back in 2016, PornHub started a bug bounty program with the idea to protect users from malvertising campaigns. The bug bounty program was meant to reward white hats between $50 and $25,000 for flaws found on its main website. Despite…

CYBER NEWS

Ichidan Search Engine Is a Popular Tool for Dark Web Surfers

The Ichidan Dark Web search engine which can be found on the Dark Web is becoming and more popular as users of all types flock to it. The site has become a popular destination for ordinary users, hackers and security…

CYBER NEWS
ATMii ATM Virus image

The ATMii ATM Virus Steals Money from Machines Worldwide

Security experts identified a new attack wave with the ATMii ATM virus that has spread worldwide. The malware has undergone a thorough analysis by the experts and is rapidly being distributed by criminals on a global scale. ATMii ATM Virus…

CYBER NEWS

The 10 Most Bizarre Things Done for Cybersecurity

Cybercrime is one of the biggest threats to both individual users and businesses worldwide. As experts globally are trying to protect their networks from intrusions and abuse, sometimes the use of unusual methods is applied for the sake of keeping…

CYBER NEWS
Mac OS X High Sierra image

Apple Patch Remedies Critical High Sierra Vulnerability (CVE-2017-7149)

Apple released an emergency update that fixed a critical bug affecting the High Sierra operating system, specifically in the APFS volume management system. . According to security reports and the company a bug allowed the passwords to be revealed via…

CYBER NEWS
Office 365 image

Office 365 Corporate Emails Targeted in KnockKnock Hacker Campaign

Office 365 users, especially corporate accounts, are currently being targeted by hackers as part of a global hacker attack campaign called KnockKnock. The criminals are targeting the Exchange online servers of major companies in different sectors worldwide. The KnockKnock Attack…

CYBER NEWS
Windows Defender image

Windows Defender Antivirus Bypass Technique Identified

Computer security experts discovered a way to bypass the Windows Defender antivirus protection during an in-depth audit application audit. This allows hackers to seek out similar potential intrusion paths in order security software. Microsoft’s Own Windows Defender Antivirus Found Insecure…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree