TOP CYBER NEWS

  • HOME
  • ATTACKS
  • MALWARES
  • STRATEGIES
  • THREATS
    • Threat Defense
    • Threats Analysis

New Free Emulator Challenges Apple's Control of iOS

Thursday, 28 November 2019 by Top Cyber News
An open-source tool gives researchers and jailbreakers a free option for researching vulnerabilities in the operating system – and gives Apple a new headache. A security researcher at Black Hat Europe in London next week plans to release an open source low-level emulator that can run a version of Apple’s mobile operating system. The project, based
Apple039sChallengesControlEmulatorfreeiOS
Read more
  • Published in Strategies
1 Comment

Apple iOS Flaw Could Give Attacker Access via iMessage

Wednesday, 31 July 2019 by Top Cyber News
Enterprise Vulnerabilities From DHS/US-CERT’s National Vulnerability Database CVE-2018-16871PUBLISHED: 2019-07-30 A flaw was found in the Linux kernel’s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence.
AccessAppleAttackerFlawGiveiMessageiOS
Read more
  • Published in Attacks
62 Comments

Bluetooth Bug Enables Tracking on Windows 10, iOS & …

Thursday, 18 July 2019 by Top Cyber News
Researchers discover a third-party algorithm in multiple high-profile Bluetooth devices exposes users to third-party tracking and data access. A team of Boston University researchers has discovered a vulnerability in several modern, high-profile Bluetooth devices that can make location and other sensitive data available to third parties. The vulnerability exists in devices running Windows 10, iOS,
10BluetoothBugEnablesiOSTrackingWindows
Read more
  • Published in Attacks
56 Comments

Google Adds Two-Factor Authentication For Its Apps on iOS

Thursday, 13 June 2019 by Top Cyber News
Android-based two-factor authentication now works for Google applications on iPad and iPhone.
AddsAppsauthenticationGoogleiOSTwoFactor
Read more
  • Published in Strategies
115 Comments

‘Exodus’ iOS Surveillance Software Masqueraded as …

Tuesday, 09 April 2019 by Top Cyber News
Italian firm appears to have developed spyware for lawful intercept purposes, Lookout says. Researchers at mobile security firm Lookout have discovered iOS versions of a spyware tool that an Italian video surveillance company appears to have designed for so-called lawful intercept purposes by governments. Non-profit white hat hacker collective Security Without Borders last month had
ExodusiOSMasqueradedSoftwareSurveillance
Read more
  • Published in Attacks
37 Comments

How iOS App Permissions Open Holes for Hackers

Thursday, 04 April 2019 by Top Cyber News
The permissions iOS apps request from users can turn the devices into spy tools and provide a toehold into the enterprise network, according to new research. In many ways, the era of the smartphone is defined by apps, which do everything from sending messages to tracking our exercise. New research shows how Apple iOS apps come
AppHackersHolesiOSOpenPermissions
Read more
  • Published in Strategies
248 Comments

Recent Posts

  • Microsoft Fixes Windows Zero-Day on Lightest Patch …

    This month’s batch of security updates ad...
  • Only 53% of Security Pros Have Ownership of …

    Most practitioners report an increase in identi...
  • Deliver a Deadly Counterpunch to Ransomware …

    You can’t prevent all ransomware attacks....
  • Microsoft ‘Campaign Views’ Offers Full Look at …

    Campaign views, arriving in public preview, aim...
  • Maersk CISO Says NotPeyta Devastated Several Unnamed US firms

    At least two companies may have been dealt even...

Flights & Hotel Finder

Archives

  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • July 2014
  • June 2014
  • May 2014
  • July 2013
  • January 2013
  • May 2011

Categories

  • Attacks
  • Cyber Security
  • Malware
  • RESOURCES
  • Strategies
  • Threat Defense
  • Threats
  • Threats Analysis

Mission

We aim to provide you the most recent updates and news on cyber matters in this digital world.

Reach us via: [email protected]

© 2018. All rights reserved by Top Cyber News.
Creative Commons License

TOP