Cyber News - Page 99

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Chrome 64 Will Block Unwanted Redirects Starting Early 2018

Plausibly 1 out of 5 feedback reports from Chrome desktop users is about encountering unwanted redirects and content, Ryan Schoen from Google has shared. Because Google is always trying to improve user experience, Chrome will soon be blocking several types…

CYBER NEWS
quantum encryption image

Quantum Encryption in Security: How It Can Protect Us

Quantum encryption is one of the trendiest topics in cybersecurity practice and theory. In essence it uses the principles of quantum mechanism to secure message transmissions. One of the distinct advantage related to its use is the fact that it…

CYBER NEWS

14 Flaws Found in Linux Kernel USB Subsystem (CVE-2017-16525)

14 flaws in Linux kernel USB drivers were just disclosed by Google researcher Andrey Konovalov. The researcher found the vulnerabilities by deploying a kernel fuzzler known as syzkaller. The “14 vulnerabilities found with syzkaller in the Linux kernel USB subsystem……

CYBER NEWS
APT28 hackers image

Latest APT28 Malware Uses Microsoft Office DDE Vulnerability

The APT28 hacking group, also known as Fancy Bear, has initiated a global attack campaign using infected documents that refer to the recent terrorist attacks in New York. The criminal collective is using a recent vulnerability affecting a component of…

CYBER NEWS

The Security and Privacy Risks Associated with Implants

Medical and non-medical chips are entering our lives despite the controversy they are surrounded by. Unfortunately, many people willing to participate in such programs are forgetting the civil and privacy issues that must be addressed by system designers, innovators, regulators,…

CYBER NEWS
Tor Browser image

The TorMoil Tor Browser Vulnerability Leaks Real IPs, Update Now!

Security experts discovered the dangerous TorMoil Tor Browser Vulnerability which has recently been fixed in the latest version of the application. All users of the hidden network application are urged to apply the critical update as soon as possible. Related…

CYBER NEWS

Panda Zeus Trojan Delivered via Black-Hat SEO Campaign

One of the last times we heard of the Panda ZeuS Trojan was in June, 2017. Apparently, the banking Trojan has been used yet again in new malicious campaigns, as reported by Cisco Talos researchers. However, there is a difference…

CYBER NEWS

Immediately Upgrade to WordPress 4.8.3 to Avoid SQL Attacks

WordPress admins, beware. Websites running on WordPress version 4.8.2 and earlier should update immediately to version 4.8.3. Security researcher Anthony Ferrara has reported an SQL injection vulnerability in the platform allowing for websites to be taken over and exploited. Even…

CYBER NEWS

Silence Trojan – the Latest Carbanak-Like Malware Against Banks

Silence is the name of a new Trojan (and the hacking group behind it), discovered in September by Kaspersky Lab researchers. The targeted attack is set against financial institutions, and at this point its victims are primarily Russian banks, as…

CYBER NEWS

Smart Cybercrime: Phishing Kits Re-Used and Backdoored

Phishing campaigns drive most of the malicious attacks in the wild, and as it turns out, cybercriminals have found an efficient way to optimize their effect. A new study reveals that attackers often re-use phishing websites across multiple hosts by…

CYBER NEWS

Stolen Code Signing Certificates Are the Hottest Dark Web Trend

Dark Web news flash – digital code signing certificates cost way more than guns in underground markets. Apparently, a single certificate may cost up to $1,200, whereas a handgun is sold for about $600. According to researchers at Venafi, the…

CYBER NEWS

Cryptocurrency Miners on Google Play Posing as Apps

Cryptocurrency miners have successfully sneaked in the Google Play store. Researchers have found apps with malicious capabilities directed towards cryptocurrency mining. The apps were found to use dynamic JavaScript loading in combination with native code injection to bypass detection by…

CYBER NEWS

Boosting Security by Moving to the Cloud

The Cloud has proven to be a great boon to data preservation for a number of companies operating as of late. As with most technology in the midst of its evolution, the Cloud still needs improvement; its sharing capabilities and…

CYBER NEWS

Reaper Botnet Malware – What Is It and How to Protect IoT Devices

New Botnet malware has been detected by malware researchers to attack IoT (Internet of Things) devices. The malware aims to compromise whole networks of IoT devices by using DdoS (denial of service) type of attacks. It also enlists the IoT…

CYBER NEWS
Magniber Ransomware image

A New Threat Emerges: Magniber Ransomware Hits South Korea

Hackers are utilizing the malevolent Magnitude Exploit Kit to distribute the new Magniber ransomware to targets in South Korea. Previously the kit has been used to deliver high-impact malware, namely the majority of Cerber ransomware strains on a global scale.…

CYBER NEWS
WaterMiner Monero Miner image

WaterMiner Monero Miner Is the Newest Cryptocurrency Malware

The dangerous trend of creating new ways to infect client computers has led to the development of WaterMiner ‒ an evasive malware Monero miner. A detailed security reveals how this malicious software takes advantage of weak security and takes advantage…

CYBER NEWS

Dark Web Trends: Zcash, Monero and Etherium Becoming Popular

Europol released a detailed report on the dark web hacker underground networks which states that criminals are preferring to use Zcash, Monero and Etherium over Bitcoin in some cases. The rising trend of using the alternative digital currencies means that…

CYBER NEWS

Microsoft Finds RCE Bug in Google Chrome (CVE-2017-5121)

Microsoft discovered a critical vulnerability in the Google Chrome web browser which is tracked under the CVE-2017-5121 advisory. The details pertaining in its discovery reveal some of the issues that web browsers face in today’s world where hacker attacks and…

CYBER NEWS
Krack Attack image

Wi-Fi Encryption Protocol WPA2 Now Unsafe Due to Krack Attack

Computer users beware, your Internet access may no longer be safe as security experts discovered that the most popular Wi-Fi encryption protocol WPA2 can be cracked. The discovery became popular as the Krack attack which is short for Key Reinstallation…

CYBER NEWS
AdBlock Plus image

Fake AdBlock Plus Extension Plagues the Google Chrome Store

Google’s own Chrome Web Store repository has been found to feature a counterfeit AdBlock Plus extension which infected thousands of users. This is a yet another incident involving Google Chrome’s repository which is being abused constantly by computer hackers. Chrome…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree