Posts From CCME

Online scammers are using changes to European banking rules around customer authentication to trick consumers into handing over their sensitive financial details, according to Which? The consumer rights group warned that attackers are spoofing the emails being sent from banks,

The infamous Stuxnet cyber-attack on Iran’s nuclear program was made possible by an insider recruited by a Dutch intelligence agency, who fed back crucial information and deployed the virus, according to a new report. Although not confirmed by Dutch agency

Experts at SEC Consult discovered several security issues in various Zyxel devices that allow to hack them via unauthenticated DNS requests. Security researchers at SEC Consult discovered multiple vulnerabilities in various Zyxel devices, including hardcoded credentials and issues that could

The UK’s Crown Prosecution Service (CPS) is in the dock after recording a sharp rise in device losses, an increase in unauthorized disclosure of sensitive data and rising electronic media losses. The government agency for criminal prosecutions in England and

Zero-day broker Zerodium has updated the price list for both Android and iOS exploits, with Android ones having surpassed the iOS ones for the first time. For the first time, the price for Android exploits is higher than the iOS

Android 10 released by Google with immense changes to protect user privacy and gives more control for user’s to restrict what data the apps can use. The Android 10 also includes dark theme, live caption, Smart Reply, Gesture Navigation and

Cybercriminals distribute malware disguised as textbooks and essays that downloaded from pirated websites. The costs of materials posted by the university are high. which leads students to look for a free or low-cost alternative’s online. Taking this as an advantage,

Exploit acquisition platform Zerodium released a new payout for mobile exploits with surprising payment for both Android and iOS platforms. Zerodium, a Cybersecurity company known for buying premium exploits from security researchers for several platforms including Operating Systems, Web Browsers,

North Korea has denied allegations that it obtained $2bn by carrying out state-sponsored cyber-attacks on banks and cryptocurrency exchanges. Claims that the one-party republic had used “widespread and increasingly sophisticated” cyber-attacks to steal money to fund the development of weapons

A new study has found that, in the last 12 months, 43% of UK SMEs were targeted by phishing attacks in which hackers impersonated members of staff. Worryingly, the instigators behind two thirds of these attacks saw their plans bear

The perception of cloud security appears to have reached a tipping point, with a majority of cybersecurity leaders now believing the risk of a breach is the same or lower than in on-premises environments, according to Nominet. The .uk registry

The Chinese face-swapping ZAO app that allows users to create photos starring along their favorite characters is raising privacy concerns. The ZAO app is one of the most downloaded applications, but it made the headlines due to privacy concerns. The

A French retail consultancy exposed data on millions of its clients’ customers as well as sensitive business information, after researchers discovered an unsecured Elasticsearch database. Aliznet, which specializes in digital transformation, names the likes of tech giants IBM, Oracle and

The personal details of over 200,000 customers of a British holiday firm were left exposed in audio files for several years, according to a new report. Truly Travels, which trades under the name Teletext Holidays, is unusual in that consumers

Each and everyday cyber attacks keep on evolving, so Cyber security training for employees is very essential for today’s businesses to prevent digital assets from cyber attack. Today’s businesses depend on digital systems and the internet in a way that

Kali Linux 2019.3 released with updates in kernel version, new NetHunter features, changes with ARM packages and Cloudflare integration for repositories. The Kali Linux is the #1 Best Operating system for Ethical Hacking and Penetration testing Distribution, it was developed