• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Author

John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!




Breaking  / data security  / Latest Cybersecurity News
Croatia’s largest petrol company becomes victim to ransomware
John Greenwood Posted On February 24, 2020

Croatia ransomware attack

On Feb14th, at 10:00 pm local time the company became victim to a ransomware attack and has infected its systems.


Continue Reading
1




Android Security  / Breaking  / Latest Cybersecurity News  / Mobile security
Ginp Android Trojan disguises as legitimate Banking App notifications and SMS.
John Greenwood Posted On February 19, 2020

Ginp Android Trojan

Security researchers at Kaspersky have identified a new mobile Trojan called Ginp that is capable of infecting Android devices. Banking Trojans usually access SMS in mobile devices to identify the one-time codes, once gaining access to apps, then the Trojan will have extensive access over the device and banking apps in particular.


Continue Reading
1




Breaking  / data security  / Latest Cybersecurity News
Palestinian militant group employs Catfishing and lures Israelian soldiers to install Malicious Apps
John Greenwood Posted On February 17, 2020

Catfishing attack

Hamas Palestinian militant group executed a catfishing campaign by disguising as teenage girls to lure Israelian soldiers by interacting with them to perform social engineering attacks and install a malicious app on their mobile devices.


Continue Reading
1




Breaking  / Latest Cybersecurity News  / Windows security
Microsoft Patch Tuesday February 2020 releases patch for 99 security flaws
John Greenwood Posted On February 12, 2020

Microsoft Patch Tuesday February 2020

Microsoft has released its patches for the February Patch Tuesday which includes patches for an alarming count of 99 vulnerabilities, making it the biggest Patch Tuesday till date. Out of those 99 vulnerabilities, 12 were marked critical, 87 were mentioned as […]


Continue Reading
0




Breaking  / data security  / Latest Cybersecurity News
The California Consumer Privacy Act will apply even to residents outside of California
John Greenwood Posted On February 10, 2020

CCPA outside of California

While the law is only confined to Californian residents, few companies have extended their CCPA compliance support to all the Americans. Netflix, Microsoft, Starbuck, UPS and more companies are extending their CCPA compliance to the entire country than just for California.


Continue Reading
0




Breaking  / Computer security  / Latest Cybersecurity News
Rockdale County becomes victim to ransomware attack 
John Greenwood Posted On February 8, 2020

Rockdale County ransomware attack

On Feb 6th, Rockdale County Technology Services became victim to a ransomware attack which has compromised multiple servers within the organization.


Continue Reading
3




Breaking  / Latest Cybersecurity News  / SCCM
System Center 2012 R2 Configuration Manager- Upgrade, Design, Features, System Requirements
John Greenwood Posted On January 28, 2020

System Center 2012 R2 Configuration Manager

System Center 2012 R2 Configuration Manager is now for its unified management for service provider, Windows Azure ecosystem and on-premises with the most cost effective and hassle-free management, with perks for enterprise scale application management and support.


Continue Reading
2




Breaking  / data security  / Latest Cybersecurity News
The crimes of Aleksei Burkov and behind the screens of the stolen credit cards
John Greenwood Posted On January 25, 2020

Aleksei Burkov

Burkov created two illegal websites, Cardplanet marketplace and Cybercrime forum. Cardplanet marketplace hosted the details of the stolen credit cards, approximately 150,000 payment details which was stolen between 2009-13.


Continue Reading
0




Android Security  / Breaking  / Latest Cybersecurity News  / Mobile security
Android Xiny malware can gain root access to your devices
John Greenwood Posted On January 24, 2020

Android Xiny

Android Xiny is malware that enters the device, remove the preinstalled applications that controls the root privilege access, after removing those applications, Android Xiny gets root access to the device.


Continue Reading
0




Breaking  / Computer security  / Latest Cybersecurity News
Chameleon attack can now manipulate your ‘likes’ on Facebook, Linkedin and Twitter
John Greenwood Posted On January 22, 2020

Chameleon attack

The link previews and redirected links in the OSN is taken advantage to alter the published content. This OSN based trickery lures users to like a malicious posts and alter itself to a different content/post after user’s action is called the Chameleon attack.


Continue Reading
0




20
Newer Posts

  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search