Skip to content
May 22, 2025
  • Linkedin
  • Twitter
  • Facebook
  • Youtube

Daily CyberSecurity

Primary Menu
  • Home
  • Cyber Security
  • Cybercriminals
  • Data Leak
  • Linux
  • Malware Attack
  • Open Source Tool
  • Technology
  • Vulnerability
Android malware developed with Kotlin was found on Google Play
2 min read
  • Malware

Android malware developed with Kotlin was found on Google Play

Ddos January 11, 2018
Trend Micro’s security researchers found a malicious application in Google Play that was developed using the Kotlin...
Read More Read more about Android malware developed with Kotlin was found on Google Play
CPU bug fixes lead to Ubuntu 16.04 machine does not start Ubuntu 16.04
1 min read
  • Technology

CPU bug fixes lead to Ubuntu 16.04 machine does not start

Ddos January 11, 2018
Some Ubuntu 16.04 users reported that after they updated their systems that received fixes for Meltdown and...
Read More Read more about CPU bug fixes lead to Ubuntu 16.04 machine does not start
Intel: The CPU security patch for Linux are available to Pentium Chipset CPU security patch
1 min read
  • Technology

Intel: The CPU security patch for Linux are available to Pentium Chipset

Ddos January 11, 2018
Specter, Meltdown vulnerabilities exposed by the Intel CPU processor are booming, but in fact, Intel has long...
Read More Read more about Intel: The CPU security patch for Linux are available to Pentium Chipset
Ubuntu Kernel and NVIDIA Update: Fix Meltdown and Specter Vulnerabilities Ubuntu 16.04.4 LTS
1 min read
  • Technology

Ubuntu Kernel and NVIDIA Update: Fix Meltdown and Specter Vulnerabilities

Ddos January 10, 2018
Canonical today fulfilled its promise with the latest in-line kernel and NVIDIA updates fixing Meltdown and Specter...
Read More Read more about Ubuntu Kernel and NVIDIA Update: Fix Meltdown and Specter Vulnerabilities
FBI: Nearly 8,000 devices we can not hack FBI
1 min read
  • News

FBI: Nearly 8,000 devices we can not hack

Ddos January 10, 2018
The FBI has been one of the biggest supporters of backdoors in devices such as smartphones and tablets,...
Read More Read more about FBI: Nearly 8,000 devices we can not hack
ARTEMIS: Real-Time Detection and Automatic Mitigation for Border Gateway Protocol (BGP) Prefix Hijacking Border Gateway Protocol
2 min read
  • Technique

ARTEMIS: Real-Time Detection and Automatic Mitigation for Border Gateway Protocol (BGP) Prefix Hijacking

Ddos January 10, 2018
Border Gateway Protocol (BGP) is an autonomous system routing protocol that runs on TCP. It is the...
Read More Read more about ARTEMIS: Real-Time Detection and Automatic Mitigation for Border Gateway Protocol (BGP) Prefix Hijacking
CVE-2018-0802: Microsoft Office Memory Corruption Vulnerability CVE-2018-0802
2 min read
  • Vulnerability

CVE-2018-0802: Microsoft Office Memory Corruption Vulnerability

Ddos January 10, 2018
Recently, Office Vulnerability (CVE-2018-0802) was fixed in a monthly security update released by Microsoft on Tuesday. This vulnerability...
Read More Read more about CVE-2018-0802: Microsoft Office Memory Corruption Vulnerability
Microsoft official End of mainstream support Windows 8.1 mainstream support Windows 8.1
1 min read
  • Technology

Microsoft official End of mainstream support Windows 8.1

Ddos January 10, 2018
Today, Microsoft announced the official end of mainstream support Windows 8.1 operating system. This means that Win8.1 will...
Read More Read more about Microsoft official End of mainstream support Windows 8.1
Microsoft releases January Patch Tuesday to fix 56 security issues
3 min read
  • Technology

Microsoft releases January Patch Tuesday to fix 56 security issues

Ddos January 10, 2018
Microsoft released January Patch Tuesday, fixing 56 security issues ranging from simple spoofing attacks to remote code...
Read More Read more about Microsoft releases January Patch Tuesday to fix 56 security issues
New CoffeeMiner Attack: cryptocurrency mining pool in wifi networks
2 min read
  • News

New CoffeeMiner Attack: cryptocurrency mining pool in wifi networks

Ddos January 10, 2018
According to foreign media reported on January 8, Arnau developers released a proof of concept project called...
Read More Read more about New CoffeeMiner Attack: cryptocurrency mining pool in wifi networks
Microsoft KB4056892 Meltdown/Spectre patch are incompatible with AMD Athlon-powered machines
2 min read
  • Technology

Microsoft KB4056892 Meltdown/Spectre patch are incompatible with AMD Athlon-powered machines

Ddos January 10, 2018
According to foreign media reports on January 8, Microsoft released security update Windows Meltdown, Specter KB4056892 on some...
Read More Read more about Microsoft KB4056892 Meltdown/Spectre patch are incompatible with AMD Athlon-powered machines
Microsoft: Spectre security patch will slow down your PC
3 min read
  • Technology

Microsoft: Spectre security patch will slow down your PC

Ddos January 10, 2018
On Tuesday, Microsoft said patches released to protect against Meltdown and Specter vulnerabilities led some PCs and...
Read More Read more about Microsoft: Spectre security patch will slow down your PC
Attackers installed Coinhive code to mine Monroe on the official BlackBerry Moblie website BlackBerry Moblie website
1 min read
  • News

Attackers installed Coinhive code to mine Monroe on the official BlackBerry Moblie website

Ddos January 9, 2018
Such as Bitcoin some encryption monetary value soared, attracted cybercriminals interest molecule. The number of incidents and cyber-attacks involving miners and mining...
Read More Read more about Attackers installed Coinhive code to mine Monroe on the official BlackBerry Moblie website
Intel: CPUs affected by the vulnerabilities will be fully repaired by the end of January CPU vulnerability
2 min read
  • Technology

Intel: CPUs affected by the vulnerabilities will be fully repaired by the end of January

Ddos January 9, 2018
In today’s CES presentation, Intel CEO Brian Krzanich also recently responded to two security loopholes in the...
Read More Read more about Intel: CPUs affected by the vulnerabilities will be fully repaired by the end of January
Report: North Korea was using a malicious program to dig Monero Monero
1 min read
  • Technology

Report: North Korea was using a malicious program to dig Monero

Ddos January 9, 2018
Researchers at security firm AlienVault discovered malware that dredged Montero and tracked the dredging money flowing into a North Korean university. This...
Read More Read more about Report: North Korea was using a malicious program to dig Monero

Posts pagination

Previous 1 … 620 621 622 623 624 625 626 … 639 Next

Search

💙 Support Us!
We need 50 contributors this month to keep this site running.
19 of 50 supporters this month
☕ Buy Me a Coffee PayPalDonate
Our Websites
  • Penetration Testing Tools
  • The Daily Information Technology
    • About SecurityOnline.info
    • Advertise on SecurityOnline.info
    • Contact

    When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works

    • Disclaimer
    • Privacy Policy
    • DMCA NOTICE
    • Linkedin
    • Twitter
    • Facebook
    • Youtube
    Copyright © All rights reserved.
    x