TOP CYBER NEWS

  • HOME
  • ATTACKS
  • MALWARES
  • STRATEGIES
  • THREATS
    • Threat Defense
    • Threats Analysis

Instagram Bug Put User Account Details, Phone …

Friday, 13 September 2019 by Top Cyber News
The vulnerability, now patched, is the latest in a series of bad news for Facebook. A now-patched Instagram vulnerability could have exposed users’ account data and phone numbers to cyberattackers, parent company Facebook confirmed in a new report from Forbes. The bug was discovered by an Israeli hacker who goes by the handle @ZHacker13. It
AccountBugDetailsInstagramPhonePutUser
Read more
  • Published in Threats, Threats Analysis
1 Comment

419M Facebook User Phone Numbers Publicly Exposed

Thursday, 05 September 2019 by Top Cyber News
It’s still unclear who owned the server storing hundreds of millions of records online without a password. An unsecured server exposed 419 million phone numbers belonging to Facebook users, whose information was stored in several databases without password protection, TechCrunch reports. The records spanned Facebook account holders in countries including the US (133 million), UK
419MExposedfacebookNumbersPhonePubliclyUser
Read more
  • Published in Strategies
33 Comments

Implementing Strong Authentication Does Not Guarantee An Excellent User Experience

Friday, 30 August 2019 by Top Cyber News
Understanding User Expectations And Business Goals Guides Security Posture The traditional password is no longer sufficient enough to prevent hackers from getting into our accounts containing a multitude of information that can be crippling to any enterprise. A limited number of passwords implemented by the typical individual means that hackers can crack one password and
authenticationExcellentExperienceGuaranteeImplementingStrongUser
Read more
  • Published in Threat Defense, Threats
77 Comments

End User Lockdown: Dark Reading Caption Contest Winners

Friday, 07 June 2019 by Top Cyber News
Phishing, cybersecurity training, biometrics and casual Fridays. And the winners are … Dark Reading reader Nick Walker (aka ntwalk) earns the top honors and a $25 Amazon gift card for his password cracking play on words in the caption, penned below. When not penning cartoon captions, Nick, of Lowell, Arkansas, works as a security analyst at J.B. Hunt Transport
ContestdarkLockdownReadingUserWinners
Read more
  • Published in Strategies
149 Comments

Misconfigured Ladders Database Exposed 13M User Records

Friday, 03 May 2019 by Top Cyber News
Enterprise VulnerabilitiesFrom DHS/US-CERT’s National Vulnerability Database CVE-2019-11683PUBLISHED: 2019-05-02 udp_gro_receive_segment in net/ipv4/udp_offload.c in the Linux kernel 5.x through 5.0.11 allows remote attackers to cause a denial of service (slab-out-of-bounds memory corruption) or possibly have unspecified other impact via UDP packets with a 0 payload, because of mishandling of padded packets, a… CVE-2019-3490PUBLISHED: 2019-05-02 A
13MDatabaseExposedLaddersMisconfiguredRecordsUser
Read more
  • Published in Strategies
65 Comments

A Guide To Protecting The End User

Tuesday, 30 April 2019 by Top Cyber News
A people-centric approach to managing cyber security vulnerability, attacks and privilege Download Your Copy We respect your privacy, by submitting this form you agree to having your details passed onto the sponsor who may promote similar products and services related to your area of interest. For further information on how we process and monitor your
GuideProtectingUser
Read more
  • Published in Strategies
62 Comments

Facebook Employees for Years Could See Millions of User Passwords in Plain Text

Friday, 22 March 2019 by Top Cyber News
2,000 Facebook engineers or developers reportedly made some nine million internal queries for data elements with plain text passwords. An internal Facebook investigation has found between 200 million and 600 million of its users may have had their account passwords stored in plain text for years, meaning they could have been searched and accessed by
EmployeesfacebookMillionsPasswordsPlainTextUserYears
Read more
  • Published in Strategies
80 Comments

Secure the System, Help the User

Monday, 25 February 2019 by Top Cyber News
The enterprise must do its part in deploying and maintaining secure systems so that end users stand a chance against attackers. Relying on end users for security is difficult, but securing enterprise systems doesn’t have to be. For a system to be valuable, it must be accessible and beneficial to end users. Organizations have improved
secureSystemUser
Read more
  • Published in Attacks
191 Comments

Photo API Bug Exposed 6.8M User Photos

Friday, 28 December 2018 by Top Cyber News
The flaw let developers access images that users may not have shared publicly, including those they started to upload but didn’t post. Facebook has apologized for a photo API bug that may have exposed photos belonging to 6.8 million users. This issue affects people who use Facebook login and gave third-party apps permission to access
68MAPIBugExposedPhotoPhotosUser
Read more
  • Published in Strategies
85 Comments

Recent Posts

  • How Attackers Used Look-Alike Domains to Steal $1 …

    Money meant to fund an Israeli startup wound up...
  • Data Center Provider CyrusOne Confirms Ransomware …

    The attack struck CyrusOne’s managed serv...
  • Senators Call for End to Controversial NSA Program

    The program for collecting telephone call metad...
  • Preparing The Secure Enterprise By Becoming Your Enemy

    Addressing The Challenges Of Securing Dynamic S...
  • VPN Flaw Allows Criminal Access to Everything on Victims' Computers

    Vulnerability in the Aviatrix VPN client, since...

Flights & Hotel Finder

Archives

  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • July 2014
  • June 2014
  • May 2014
  • July 2013
  • January 2013
  • May 2011

Categories

  • Attacks
  • Cyber Security
  • Malware
  • RESOURCES
  • Strategies
  • Threat Defense
  • Threats
  • Threats Analysis

Mission

We aim to provide you the most recent updates and news on cyber matters in this digital world.

Reach us via: [email protected]

© 2018. All rights reserved by Top Cyber News.
Creative Commons License

TOP