• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.




Breaking  / Computer security  / Latest Cybersecurity News
New WhatsApp Bug could unleash XSS payload, CSP by-pass and data security threats
William Marshal Posted On February 5, 2020

WhatsApp bug

this new WhatsApp bug (tracked as CVE-2019-18426) is an open direct flaw that could allow cyber criminals send a specially crafted messages to execute a persistent XSS attacks, upload payloads and read sensitive information.


Continue Reading
0




Breaking  / Computer security  / Latest Cybersecurity News
New Shlayer Trojan infects millions of macOS devices
William Marshal Posted On February 3, 2020

Shlayer Trojan Attack

Cyber criminals are always looking for interesting means to affect users and exploit their ignorance towards cybersecurity. MacOS is usually considered to be better than Windows machines when it comes to cybersecurity, however with the latest malware named ‘Shlayer’ aTrojan, […]


Continue Reading
1




Breaking  / Computer security  / Latest Cybersecurity News
Hackers launch sophisticated corona malware campaigns to infect computers
William Marshal Posted On February 2, 2020

Corona malware campaign

Hackers have created many phishing campaigns that are being distributed in the name of Corona. The mailer campaign is attached with a word document that is being specially designed by the hackers to infiltrate systems with Emotet malware once opened, but it is disguised as the preventive measures of Corona virus luring the recipients to open the document


Continue Reading
0




Breaking  / Computer security  / data security  / Latest Cybersecurity News
‘Cacheout’ strikes Intel again- CPUs, VMs and Intel SGX affected
William Marshal Posted On January 30, 2020

Cacheout attack

Cacheout is a speculative execution vulnerability in the modern Intel processors that were developed before October 2018. Cacheout is considered to be very critical by the researchers as it can bypass multiple boundaries, affecting hyper-threads, processors, virtual machines, user to kernel space, and even the Intel Security Guard Extensions (SGX).


Continue Reading
0




Breaking  / Cyber Security  / data security  / Latest Cybersecurity News
Three Indonesian hackers were arrested for Magecart attacks on e-commerce sites. 
William Marshal Posted On January 27, 2020

Indonesian hackers arrested

In a press release on Jan 24, 2020, Indonesian National Police and the Interpol together did mentioned that, they have arrested three Indonesian hackers for employing Magecart attacks to breach into number of e-commerce websites and stealing the payment card details of the buyers. The hackers were arrested on Dec 20th and the same was disclosed on Jan 25th via Interpol’s Twitter Account.


Continue Reading
0




Breaking  / iOS security  / Latest Cybersecurity News  / Mobile security
Amazon founder’s iPhone is hacked using the Saudi Prince’s What’sApp account
William Marshal Posted On January 23, 2020

Bezos iphone hack

Jeff Bezos, the founder of Amazon and the world’s richest man’s iPhone was hacked on May 2018. Bezos received a MP4 file in his WhatsApp account from the Saudi Prince Mohammad Bin Salmon.


Continue Reading
0




Breaking  / Latest Cybersecurity News  / SCCM
What is SCCM- Introduction, Capabilities and Architectures
William Marshal Posted On January 21, 2020

What is SCCM

System Centre Configuration Manager(SCCM) is a Microsoft Windows product that helps IT departments to manage computers from a centralized location. It was initially called as System Management Server. Microsoft SCCM helps with patch management, software deployment, remote control, operating system deployment, network protection, IT asset management and more.


Continue Reading
0




Breaking  / data security  / Latest Cybersecurity News
What is common with CCPA, SHIELD, LGPD, DPB and GDPR?
William Marshal Posted On January 20, 2020

LGPD-CCPA-SHIELD-GDPR-DPB

All these data protection laws are focused in securing personal data of the end users/residents/citizens, and to do that strong norms have to be defined along with huge penalties. One common attribute among them is increasing privacy and imposing penalties.


Continue Reading
0




Breaking  / Latest Cybersecurity News  / Windows security
A new zero-day vulnerability discovered in Internet Explorer
William Marshal Posted On January 19, 2020

Zero day vulnerability in Internet Explorer

Microsoft has issued a security advisory- ADV200001 yesterday against a new zero-day vulnerability discovered in the Internet Explorer and it is also being actively exploited in the wild by attackers. Affected versions include Internet Explorer 9, 10, and 11 in Windows 7, Windows 8.1, and Windows 10.


Continue Reading
1




Breaking  / Case Study  / Latest Cybersecurity News
A story of motivation-The infancy, childhood, teenage, and adulthood of Red Hat.
William Marshal Posted On January 16, 2020

Red Hat Case Study

It all began when a hacker named Marc Ewing, started crafting this new distribution of Linux on CDs from his Raleigh, N.C., home. The distribution was named after a Red Hat that Marc’s grandfather offered him from the Cornell University lacrosse cap. Marc was wearing this cap when he was a techie at Carnegie Mellon University.


Continue Reading
0




23
Newer Posts Older Posts

  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search