News

Cyber Security Reviews NEWS brings you the latest daily updates on trends and happenings around the globe.

0 Comments
If your e-commerce website runs on the OXID eShop platform, you need to update it immediately to prevent your site from becoming compromised. Cybersecurity researchers have discovered a pair of critical vulnerabilities in OXID eShop e-commerce software that could allow unauthenticated attackers to take full control over vulnerable eCommerce websites remotely in less than a
0 Comments
Managing the security of a business’s applications and data is a touchy subject. After all, the more digitized a business gets, the more it relies on safeguards to keep sensitive information and intellectual property away from those who seek to find it. As a result, the traditional method of ensuring data security is being held
0 Comments
Security researchers have discovered almost a dozen zero-day vulnerabilities in VxWorks, one of the most widely used real-time operating systems (RTOS) for embedded devices that powers over 2 billion devices across aerospace, defense, industrial, medical, automotive, consumer electronics, networking, and other critical industries. According to a new report Armis researchers shared with The Hacker News
0 Comments
Quantum computers, cryptography and encryption are a potent mix, especially because quantum computers could eventually give attackers a practical method for decrypting almost all traditionally encrypted data. Although the potential for quantum computing was first posited in 1982 by physicist Richard Feynman, and the MIT mathematician Peter Shor reported an algorithm that would enable quantum
0 Comments
Marcus Hutchins, better known as MalwareTech, has been sentenced to “time served” and one year of supervised release for developing and selling the Kronos banking malware. Yes, Hutchins will not go to prison, United States District Judge J.P. Stadtmueller ruled today in Milwaukee County Court. In response to today’s sentencing Hutchins said: “Sentenced to time
0 Comments
Are you using an Android device? Beware! You should be more careful while playing a video on your smartphone—downloaded anywhere from the Internet or received through email. That’s because, a specially crafted innocuous-looking video file can compromise your Android smartphone—thanks to a critical remote code execution vulnerability that affects over 1 billion devices running Android
0 Comments
Backup provider Acronis is evolving into a cybersecurity vendor. Acronis CEO Serguei Beloussov said backup alone is not enough to provide true data protection. In order to be fully protected, organizations need to guarantee their data is recoverable, accessible, private, authentic and secure. Later this year, Acronis will be launching security products with its backup
0 Comments
The Federal Trade Commission (FTC) today officially confirmed that Facebook has agreed to pay a record-breaking $5 billion fine over privacy violations surrounding the Cambridge Analytica scandal. Besides the multibillion-dollar penalty, the company has also accepted a 20-year-long agreement that enforces it to implement a new organizational framework designed to strengthen its data privacy practices
0 Comments
Blockchain technology is conceptually rather complicated. It is, however, based on basic, known technologies such as peer-to-peer networks and distributed ledger. At its core, blockchain is a distributed ledger technology for recording transactions between two or more parties. It’s been used primarily to support cryptocurrencies, but that’s changing as other uses, such as data storage,
0 Comments
Enzoic has launched a new version of Enzoic for Active Directory that includes support for real-time password monitoring to fight against the use of compromised passwords. Enzoic for Active Directory screens users’ passwords against its continuously updated database of compromised credentials, including billions of unique username and password combinations, according to the vendor. Microsoft Azure
0 Comments
Organizations with a BYOD policy may find that it helps with lowering costs, but BYOD forces IT to address issues such as data leakage and user privacy. Enterprise mobility management (EMM) and unified endpoint management (UEM) platforms accommodate BYOD with features such as mobile app-wrapping and mobile app containers, but these privileges can lead to
0 Comments
In the wake of GandCrab shutting down and master decryption keys being released, a new ransomware threat is emerging. The GandCrab ransomware had been one of the more dangerous threats since its first appearance in early 2018, but the group behind the ransomware as a service (RaaS) announced its retirement last month. On Monday, the
0 Comments
Getting started can be the most tedious part of any task, especially when the task is as daunting and perplexing as network security. But the task is manageable, as long as one understands the topic’s basics. To ensure a network security strategy operates optimally and efficiently, IT pros should start with the basics, such as
0 Comments
Zoom faced privacy concerns after the disclosure of a vulnerability that could allow threat actors to use the video conferencing software to spy on users. The Zoom vulnerability, originally reported to only affect the Mac version of the software, has been found to partially affect Windows and Linux as well. Jonathan Leitschuh, software engineer at
0 Comments
The CryptoLocker virus turns your virtual servers — the life of your data center — into encrypted blocks of data waiting for an unlock code. Although no fix is ever completely effective, there are methods to more easily and safely recover your virtual data. CryptoLocker viruses are a form of malware that encrypts your data
0 Comments
It’s been called a tech pipeline: a recruitment path for graduates of computer science or national security, both traditionally male-dominated disciplines, into the cybersecurity workforce. This pipeline is one reason why the cybersecurity industry is so homogenous in terms of diverse backgrounds. When hiring managers choose from a pool of candidates who share similar backgrounds,