Home News Security

Security

Security news and articles from the cyber world. Enjoy exciting cyber security stories and news articles updated daily. The Cyber Post brings you the latest updates on cybersec. Therefore, we cover categories from hackers to exploits and vulnerabilities.

So learn how to secure your computer, your data and your own personal identity. If that is not enough than check out some articles on how to protect the cloud environment. Maybe you are looking for information regarding exploits and current vulnerabilities? Even more the cyber post has tons of information on the latest vulnerabilities.

Fake SpaceX Youtube Channels Defraud 150,000 in Bitcoin

0
Journalists at Bleeping Computer warned that the scammers recently seized three YouTube channels, gave them new names associated with SpaceX, and then launched fake “broadcasts” with Elon Mask, during which they...

Largest Ad fraud targeting smart TVs

0
White Ops specialists found , they said, the world's largest fraudulent advertising operation using smart TVs. During the operation, called ICEBUCKET, using software bots, cybercriminals make advertisers think that real people are...

Google Analytics Used By Cybercriminals to Steal Credit Card Data

0
Attackers inject malicious code that collects payment data onto a hacked site. Cybercriminals use Google Analytics to steal credit card information from compromised e-commerce sites. According to experts from Kaspersky Lab,...

IoT Security, Attacks And The Industrial Systems at Risk

0
Hackers could target smart manufacturing and other industrial environments with new and unconventional cyber attacks designed to exploit vulnerabilities in ecosystems which are supporting the Industrial Internet of Things (IIoT) according...

New P2P Botnet Targeting IoT Devices

0
By: Ravie Lakshmanan Cybersecurity researchers have taken the wraps off a new botnet hijacking Internet-connected smart devices in the wild to perform nefarious tasks, mostly DDoS attacks, and illicit cryptocurrency...

MobiFriends Dating App Breached – 3.5 Million Credentials Leaked

0
The messages, hashed passwords and usernames of 3.5 million clients of the dating application MobiFriends were posted and available to be purchased on an underground discussion. The accreditations of 3.5...

Vulnerabilities in old GTP protocol could affect 4G and 5G networks

0
Experts cautioned that problems in the GPRS Tunneling Protocol (GTP) could affect the operation of 4G and 5G networks. In reports published  last week  and in  December 2019, Positive Technologies and A10 Networks described...

WhatsApp can be forced to decrypt WhatsApp Google Drive backups by state surveillance

0
The AES-GCM-256 key is stored and generated by WhatsApp server and is sent to the client. When a user signs in to new device, it retrieves the key from the server...

Alleged $366M Bitcoin mixer busted after analysis of 10 years of blockchain data

0
U.S. authorities have arrested the alleged mastermind behind a multi-million darknet-based BTC mixing service, Bitcoin Fog, after analyzing 10 years of blockchain data.Authorities have issued a chilling warning to...

Digital intelligence must overcome challenges to solving crypto crimes

0
While the value of cryptocurrencies has varied wildly in the last year, this has not diminished crypto’s attractiveness to criminals. Many of them are moving their illegal activities underground...