You chose more than 1 label for "Break News" widget. Please edit this widget, check Selected Labels option and then click edit link near the option. Scroll down, and in "Select labels to show" table, choose maximum 1 label only (this message can be seen by blog admin only)





You chose more than 1 label for "Pick Slider Label" widget. Please edit this widget, check Selected Labels option and then click edit link near the option. Scroll down, and in "Select labels to show" table, choose maximum 1 label only (this message can be seen by blog admin only)



item-thumbnail

Transfer.Sh Not Going Down After All

In Summary : The highly popular Linux shell-based file sharing website, Transfer.sh , announced some time ago it would be shutting down on ...

item-thumbnail

USN-3825-1: mod_perl vulnerability

In Summary : Jan Ingvoldstad discovered that mod_perl incorrectly handled configuration options to disable being used by unprivileged user...

item-thumbnail

USN-3825-2: mod_perl vulnerability

In Summary : USN-3825-1 fixed a vulnerability in mod_perl. This update provides the corresponding update for Ubuntu 12.04 ESM. Original adv...

item-thumbnail

21-year-old man Managed Stole $1 Million in Seconds Through SIM-swapping Hacks

In Summary : A 21-year-old man, Nicholas Truglia, charged for hacking into the phones of Silicon Valley executive phones to steal their cr...

item-thumbnail

US Postal Service Exposes Data of 60 Million Users for Over a Year

In Summary : The US Postal Service ignored for more than a year an authentication oversight that exposed the account details of 60 million...

item-thumbnail

PSA: Phishing Levels Rise Ahead of Black Friday and Cyber Monday

In Summary : With the shopping season underway, cybercriminals are making efforts to capitalize from key holidays and users' craze for...

item-thumbnail

Cybersecurity Myths: Is Mac OS Safer Than Windows?

In Summary : There seems to be a general belief among the people that Mac OS is safer than Windows. We know many reasons why the public is...

item-thumbnail

VMware Releases Critical Security Updates for Multiple Vulnerabilities

In Summary : VMware releases critical security updates for vSphere Data Protection (VDP) that address a number of security vulnerabilities...

item-thumbnail

Facebook Increases Average Bounty rewards for High Impact Vulnerabilities

In Summary : Facebook increases the average payout for security researchers to encourage them to find high impact Vulnerabilities. The res...

item-thumbnail

Amazon Suffered Data Breach – Customers Name & Email Addresses Exposed

In Summary : Amazon revealed that it suffered a Data breach before the Black Friday and leaks customers names and Email address. The e-com...

item-thumbnail

Split View Mode Is Now Available for Skype on Windows 10

In Summary : This new update to Microsoft's modernized Skype 8 brings Split View which allows you to simultaneously open multiple Skyp...

item-thumbnail

How a Security Test for DropBox Revealed 3 Apple Zero Day Vulnerabilities

In Summary : When Dropbox hired a security firm to perform a Red Team cyber attack simulation on their services, little did they know that...

item-thumbnail

Microsoft Launcher Beta Gets a Big Update With New Features

In Summary : Today, Microsoft announced a big update for Microsoft Launcher and the build is currently rolling out to beta testers. The up...

item-thumbnail

German eID Authentication Flaw Lets You Change Identity

In Summary : The authentication process via German ID cards with RFID chips to certain web services can be manipulated to allow identity s...

item-thumbnail

Mozilla Overhauls Content Blocking Settings in Firefox 65

In Summary : In Firefox 65, Mozilla is overhauling how users can configure the Content Blocking settings. With this version, the previousl...

item-thumbnail

Mirai Evolves From IoT Devices to Linux Servers

In Summary : Netscout says it has observed at least one dozen Mirai variants attempting to exploit a recently disclosed flaw in Hadoop YAR...

item-thumbnail

USPS Site Exposed Data on 60 Million Users

In Summary : U.S. Postal Service just fixed a security weakness that allowed anyone who has an account at  usps.com to view account detail...

item-thumbnail

The Who, What, and How of Cyberbullying

In Summary : The internet has allowed society to stay connected in more ways than ever before. We can speak to strangers across the globe,...

item-thumbnail

Amazon Low-Key Reveals Breach of Some Customer Data

In Summary : 'Technical error' exposed names and email addresses. [...] kindly refer the following link as follow up : https://www...

item-thumbnail

How to Deconstruct a Football Tackle With Physics

In Summary : Using video of a football collision, you can figure out the velocity and momentum of the players involved. [...] kindly refer ...

item-thumbnail

How Much Weed Should Someone Try If It's Their First Time?

In Summary : TBH, make sure they know the difference between THC and CDB. And try a tincture to start? [...] kindly refer the following lin...

item-thumbnail

Did the CDC Really Just Ban … Romaine Lettuce?

In Summary : You do. Plus: A brief history of E. coli outbreaks [...] kindly refer the following link as follow up : https://www.wired.com...

item-thumbnail

Linux Apps Will Soon Get Access to Android Folders on Chrome OS

In Summary : What this means is that users would have to deal with fewer restrictions when moving data from one operating system to ano...

item-thumbnail

ZDNet ​Dell XPS 13: The best Linux laptop of 2018

In Summary : Do you want the best of the best Linux laptop this holiday season and price is no object? If that's you, then you want th...

item-thumbnail

Building The Linux Kernel With Clang Is Becoming Popular Again

In Summary : Years ago there was much interest in the ability to build the mainline Linux kernel with the LLVM Clang compiler as an altern...

item-thumbnail

NVIDIA 415.18 Linux Driver Released: Adds HardDPMS, Fixes Wine Bug & Much More

In Summary : NVIDIA has just released the 415.18 Linux graphics driver as their first stable update in the 415 driver series. This builds ...

item-thumbnail

A pen test story

In Summary : Singing the Blues: Taking Down an Insider Threat "I had all of the advantages. I was already inside the network. No one s...

item-thumbnail

ECCploit: ECC Memory Vulnerable to Rowhammer Attacks After All

In Summary : How well does ECC protects against Rowhammer? Exploiting Correcting Codes: On the Effectivenessof ECC Memory Against Rowhamme...

item-thumbnail

Security recommendations for hosting on AWS

In Summary : All state of the art hosting services make the security of [...] kindly refer the following link as follow up : https://ift.t...

item-thumbnail

Two Young Hackers Jailed For Hacking TalkTalk that Costs £77million

In Summary : Two young hackers jailed for their roles in a hack attack on TalkTalk which hit 157,000 accounts and costs £77million. Matthe...

item-thumbnail

New Hacking Group Outlaw Distributing Botnet to Scan The Network & Perform Cryptocurrency-Mining & Brute-Force Attack

In Summary : A new hacking group called Outlaw distributing powerful botnet in order to perform the network scanning crypto-mining operati...

item-thumbnail

Russia Linked Group Resurfaces With Large-Scale Phishing Campaign

In Summary : APT29/Cozy Bear is targeting individuals in military, government, and other sectors via email purporting to be from US State ...

item-thumbnail

Active XSS Attacks Targeting Amp for WP WordPress Plugin

In Summary : Vulnerabilities were recently discovered in the popular AMP for WP plugin that allows any registered user to perform administ...

item-thumbnail

Report: Tens of Thousands of E-Commerce Sites at Heightened Security Risk

In Summary : Report delivered at Payment Card Industry Security Standards Council meeting flags issues in deployments of Magento, a popula...

item-thumbnail

Cybersecurity at the Core

In Summary : For too long, cybersecurity has been looked at as one team's responsibility. If we maintain that mentality, we will fail. ...

item-thumbnail

Consumers Are Forgiving After a Data Breach, but Companies Need To Respond Well

In Summary : A solid response and reputation management program will go a long way in surviving a major breach - and there's software ...

item-thumbnail

VisionDirect Data Breach Caused by MageCart Attack

In Summary : VisionDirect, a popular contact lens online merchant in Europe, has posted an advisory stating that their web site had a data...

item-thumbnail

Hands-Free Skype Calling Now Available using Amazon Alexa

In Summary : Microsoft today confirmed that Skype calling is coming to Amazon Echo devices but the feature doesn't appear to be availa...

item-thumbnail

Vulnerability in AMP for WP Plugin Allowed Admin Access to WordPress

In Summary : A vulnerability for the very popular AMP for WP WordPress plugin with a 100 thousand active installations was discovered that...

item-thumbnail

New Gmail Bug Allows Sending Messages Anonymously

In Summary : A new bug discovered in Gmail affects the web app's user experience by hiding the source address of an email, a situation...

item-thumbnail

VMware Releases Security Updates

In Summary : Original release date: November 20, 2018 VMware has released security updates to address vulnerabilities in vSphere Data Prot...

item-thumbnail

Most Important Consideration of Confidentiality,Integrity, Availability (CIA Triad) to Avoid Organization Data Breach

In Summary : It is not wrong to say that information is power in today’s fast changing competitive world. The one who has right informatio...

item-thumbnail

When Did Fish Learn to Walk? Antarctica May Hold the Answer

In Summary : Fossil hunters are launching an Antarctic expedition to learn how fish developed into land animals. [...] kindly refer the fol...

item-thumbnail

This Thanksgiving, Ditch the Food Psychology

In Summary : Cornell scientist Brian Wansink rocketed to fame by crafting easy, appealing rules on how to avoid overeating. Turns out, tho...

item-thumbnail

How To Change GDM Login Screen Background In Ubuntu

In Summary : This brief guide describes how to change GDM Login screen background in Ubuntu 18.04 LTS desktop operating system. [...] kindl...

item-thumbnail

Mini-Internet using LXC

In Summary : Mini-Internet using LXC for practical works. Contribute to flesueur/mi-lxc development by creating an account on GitHub. [...]...

item-thumbnail

Web Browser Address Bar Spoofing

In Summary : This blog post looks at two address bar spoofing incidents. The first involved the Homograph vulnerability, where attackers u...

item-thumbnail

Not So Cozy: An Uncomfortable Examination of a Suspected APT29 Phishing Campaign

In Summary : FireEye detected new targeted phishing activity at more than 20 of our clients across multiple industries. [...] kindly refer ...

item-thumbnail

Office 365 and Azure AD vulnerable to brute-force and password spray attacks

In Summary : Azure AD is the de facto gatekeeper of Microsoft cloud solutions such as Azure, Office 365, Enterprise Mobility. As an integr...

item-thumbnail

Google Inbox recipient spoofing vulnerability

In Summary : One of these screenshots is a draft email to the real PayPal support. The other one is to a scammer. Both screenshots are ide...

item-thumbnail

Write-up about Adobe Flash Player bug patched today

In Summary : TLDR; There’s a bug in Adobe Flash. The interpreter code of the Action Script Virtual Machine (AVM) does not reset a with-sco...

item-thumbnail

Kickstart Application Security on Heroku with the Templarbit Buildpack

In Summary : Heroku remains a popular choice for teams to run their software [...] kindly refer the following link as follow up : https://...

Home index


You chose more than 1 label for "Updates" widget. Please edit this widget, check Selected Labels option and then click edit link near the option. Scroll down, and in "Select labels to show" table, choose maximum 1 label only (this message can be seen by blog admin only)



Ads Max Width 630px



You chose more than 1 label for "News" widget. Please edit this widget, check Selected Labels option and then click edit link near the option. Scroll down, and in "Select labels to show" table, choose maximum 1 label only (this message can be seen by blog admin only)





You chose more than 1 label for "Sale off" widget. Please edit this widget, check Selected Labels option and then click edit link near the option. Scroll down, and in "Select labels to show" table, choose maximum 1 label only (this message can be seen by blog admin only)





You chose more than 1 label for "Photos" widget. Please edit this widget, check Selected Labels option and then click edit link near the option. Scroll down, and in "Select labels to show" table, choose maximum 1 label only (this message can be seen by blog admin only)





You chose more than 1 label for "Accessories" widget. Please edit this widget, check Selected Labels option and then click edit link near the option. Scroll down, and in "Select labels to show" table, choose maximum 1 label only (this message can be seen by blog admin only)



ADS

Popular Posts

Random Posts

Flickr Photo

StatCounter

View My Stats