Cyber Security News

Critical Root Access Flaw on macOS
Date

Critical Root Access Flaw on macOS

Apple has recently patched a serious root access flaw found macOS High Sierra. The flaw allows for the authentication to bypass making the system exceptional vulnerable to exploitation. The flaw would enable a potential attacker to gain root access to the vulnerable system. Apple has described the v

Cobalt Quick to Exploit Windows Vulnerability
Date

Cobalt Quick to Exploit Windows Vulnerability

Hacking group Cobalt, who has developed a reputation for attacking banks, have been quick to exploit a Windows vulnerability that recently surfaced. Microsoft has patched the vulnerability found in Microsoft Office and it is strongly advised that all patches are downloaded as soon as possible. The v

Terdot Banking Trojan a Serious Threat
Date

Terdot Banking Trojan a Serious Threat

Terdot was first seen in the wild in October 2016, while discovered over a year ago it has managed to fly under the radar. While initially developed to be solely a banking Trojan, Terdot has since grown into a sophisticated hacking tool that can also work as a backdoor and infostealer. One of the in

BlueBorne Vulnerability Affects Amazon Echo
Date

BlueBorne Vulnerability Affects Amazon Echo

In September this year, researchers at Armis, a company specializing in the Internet of Things security, announced that they had developed a proof of concept code that would allow potential hackers to hack Bluetooth devices. BlueBorne is the name given to a collection of eight vulnerabilities which

Boeing 757 Hacked
Date

Boeing 757 Hacked

A team consisting of government, industry, and academic officials successfully demonstrated that a commercial aircraft could be remotely hacked in a non-laboratory setting. The hack occurred in September 2016 and was recently announced at the 2017 CyberSat Summit in Tyson’s Corner, Virginia. Robert

Cryptojacking Surges in Popularity
Date

Cryptojacking Surges in Popularity

Since the emergence of Coinhive was reported the popularity of cryptojacking has increased exponentially. Coinhive allows website owners to integrate a Javascript miner on their website to generate extra revenue. The mining is done by the website user when on the website. Many websites have adopted

Crunchyroll.com Hijacked
Date

Crunchyroll.com Hijacked

Popular websites have always been a target for hackers trying to spread malware. The popular website Crunchyroll.com, which allows users to stream their favorite anime shows, experienced an attack over the weekend which forced the company to close its website over the weekend. While there is still s

Hackers Hijack Ethereum Mining Equipment
Date

Hackers Hijack Ethereum Mining Equipment

Hackers targeting all facets of the cryptocurrency boom is by no means a new phenomenon. On Nov 1, news broke of two separate incidents targeting cryptocurrency wallets in two different ways. Reasons for cryptocurrencies becoming one of the favored targets for hackers can be directly attributed thei