Pick Slider Label

item-thumbnail

Transfer.Sh Not Going Down After All

In Summary : The highly popular Linux shell-based file sharing website, Transfer.sh , announced some time ago it would be shutting down on ...

item-thumbnail

USN-3825-1: mod_perl vulnerability

In Summary : Jan Ingvoldstad discovered that mod_perl incorrectly handled configuration options to disable being used by unprivileged user...

item-thumbnail

USN-3825-2: mod_perl vulnerability

In Summary : USN-3825-1 fixed a vulnerability in mod_perl. This update provides the corresponding update for Ubuntu 12.04 ESM. Original adv...

item-thumbnail

21-year-old man Managed Stole $1 Million in Seconds Through SIM-swapping Hacks

In Summary : A 21-year-old man, Nicholas Truglia, charged for hacking into the phones of Silicon Valley executive phones to steal their cr...

item-thumbnail

US Postal Service Exposes Data of 60 Million Users for Over a Year

In Summary : The US Postal Service ignored for more than a year an authentication oversight that exposed the account details of 60 million...

item-thumbnail

PSA: Phishing Levels Rise Ahead of Black Friday and Cyber Monday

In Summary : With the shopping season underway, cybercriminals are making efforts to capitalize from key holidays and users' craze for...

item-thumbnail

Cybersecurity Myths: Is Mac OS Safer Than Windows?

In Summary : There seems to be a general belief among the people that Mac OS is safer than Windows. We know many reasons why the public is...

item-thumbnail

VMware Releases Critical Security Updates for Multiple Vulnerabilities

In Summary : VMware releases critical security updates for vSphere Data Protection (VDP) that address a number of security vulnerabilities...

item-thumbnail

Facebook Increases Average Bounty rewards for High Impact Vulnerabilities

In Summary : Facebook increases the average payout for security researchers to encourage them to find high impact Vulnerabilities. The res...

item-thumbnail

Amazon Suffered Data Breach – Customers Name & Email Addresses Exposed

In Summary : Amazon revealed that it suffered a Data breach before the Black Friday and leaks customers names and Email address. The e-com...

item-thumbnail

Split View Mode Is Now Available for Skype on Windows 10

In Summary : This new update to Microsoft's modernized Skype 8 brings Split View which allows you to simultaneously open multiple Skyp...

item-thumbnail

How a Security Test for DropBox Revealed 3 Apple Zero Day Vulnerabilities

In Summary : When Dropbox hired a security firm to perform a Red Team cyber attack simulation on their services, little did they know that...

item-thumbnail

Microsoft Launcher Beta Gets a Big Update With New Features

In Summary : Today, Microsoft announced a big update for Microsoft Launcher and the build is currently rolling out to beta testers. The up...

item-thumbnail

German eID Authentication Flaw Lets You Change Identity

In Summary : The authentication process via German ID cards with RFID chips to certain web services can be manipulated to allow identity s...

item-thumbnail

Mozilla Overhauls Content Blocking Settings in Firefox 65

In Summary : In Firefox 65, Mozilla is overhauling how users can configure the Content Blocking settings. With this version, the previousl...

item-thumbnail

Mirai Evolves From IoT Devices to Linux Servers

In Summary : Netscout says it has observed at least one dozen Mirai variants attempting to exploit a recently disclosed flaw in Hadoop YAR...

item-thumbnail

USPS Site Exposed Data on 60 Million Users

In Summary : U.S. Postal Service just fixed a security weakness that allowed anyone who has an account at  usps.com to view account detail...

item-thumbnail

The Who, What, and How of Cyberbullying

In Summary : The internet has allowed society to stay connected in more ways than ever before. We can speak to strangers across the globe,...

item-thumbnail

Amazon Low-Key Reveals Breach of Some Customer Data

In Summary : 'Technical error' exposed names and email addresses. [...] kindly refer the following link as follow up : https://www...

item-thumbnail

How to Deconstruct a Football Tackle With Physics

In Summary : Using video of a football collision, you can figure out the velocity and momentum of the players involved. [...] kindly refer ...

item-thumbnail

How Much Weed Should Someone Try If It's Their First Time?

In Summary : TBH, make sure they know the difference between THC and CDB. And try a tincture to start? [...] kindly refer the following lin...

item-thumbnail

Did the CDC Really Just Ban … Romaine Lettuce?

In Summary : You do. Plus: A brief history of E. coli outbreaks [...] kindly refer the following link as follow up : https://www.wired.com...

item-thumbnail

Linux Apps Will Soon Get Access to Android Folders on Chrome OS

In Summary : What this means is that users would have to deal with fewer restrictions when moving data from one operating system to ano...

item-thumbnail

ZDNet ​Dell XPS 13: The best Linux laptop of 2018

In Summary : Do you want the best of the best Linux laptop this holiday season and price is no object? If that's you, then you want th...

item-thumbnail

Building The Linux Kernel With Clang Is Becoming Popular Again

In Summary : Years ago there was much interest in the ability to build the mainline Linux kernel with the LLVM Clang compiler as an altern...

item-thumbnail

NVIDIA 415.18 Linux Driver Released: Adds HardDPMS, Fixes Wine Bug & Much More

In Summary : NVIDIA has just released the 415.18 Linux graphics driver as their first stable update in the 415 driver series. This builds ...

item-thumbnail

A pen test story

In Summary : Singing the Blues: Taking Down an Insider Threat "I had all of the advantages. I was already inside the network. No one s...

item-thumbnail

ECCploit: ECC Memory Vulnerable to Rowhammer Attacks After All

In Summary : How well does ECC protects against Rowhammer? Exploiting Correcting Codes: On the Effectivenessof ECC Memory Against Rowhamme...

item-thumbnail

Security recommendations for hosting on AWS

In Summary : All state of the art hosting services make the security of [...] kindly refer the following link as follow up : https://ift.t...

item-thumbnail

Two Young Hackers Jailed For Hacking TalkTalk that Costs £77million

In Summary : Two young hackers jailed for their roles in a hack attack on TalkTalk which hit 157,000 accounts and costs £77million. Matthe...

item-thumbnail

New Hacking Group Outlaw Distributing Botnet to Scan The Network & Perform Cryptocurrency-Mining & Brute-Force Attack

In Summary : A new hacking group called Outlaw distributing powerful botnet in order to perform the network scanning crypto-mining operati...

item-thumbnail

Russia Linked Group Resurfaces With Large-Scale Phishing Campaign

In Summary : APT29/Cozy Bear is targeting individuals in military, government, and other sectors via email purporting to be from US State ...

item-thumbnail

Active XSS Attacks Targeting Amp for WP WordPress Plugin

In Summary : Vulnerabilities were recently discovered in the popular AMP for WP plugin that allows any registered user to perform administ...

item-thumbnail

Report: Tens of Thousands of E-Commerce Sites at Heightened Security Risk

In Summary : Report delivered at Payment Card Industry Security Standards Council meeting flags issues in deployments of Magento, a popula...

item-thumbnail

Cybersecurity at the Core

In Summary : For too long, cybersecurity has been looked at as one team's responsibility. If we maintain that mentality, we will fail. ...

item-thumbnail

Consumers Are Forgiving After a Data Breach, but Companies Need To Respond Well

In Summary : A solid response and reputation management program will go a long way in surviving a major breach - and there's software ...

item-thumbnail

VisionDirect Data Breach Caused by MageCart Attack

In Summary : VisionDirect, a popular contact lens online merchant in Europe, has posted an advisory stating that their web site had a data...

item-thumbnail

Hands-Free Skype Calling Now Available using Amazon Alexa

In Summary : Microsoft today confirmed that Skype calling is coming to Amazon Echo devices but the feature doesn't appear to be availa...

item-thumbnail

Vulnerability in AMP for WP Plugin Allowed Admin Access to WordPress

In Summary : A vulnerability for the very popular AMP for WP WordPress plugin with a 100 thousand active installations was discovered that...

item-thumbnail

New Gmail Bug Allows Sending Messages Anonymously

In Summary : A new bug discovered in Gmail affects the web app's user experience by hiding the source address of an email, a situation...

item-thumbnail

VMware Releases Security Updates

In Summary : Original release date: November 20, 2018 VMware has released security updates to address vulnerabilities in vSphere Data Prot...

item-thumbnail

Most Important Consideration of Confidentiality,Integrity, Availability (CIA Triad) to Avoid Organization Data Breach

In Summary : It is not wrong to say that information is power in today’s fast changing competitive world. The one who has right informatio...

item-thumbnail

When Did Fish Learn to Walk? Antarctica May Hold the Answer

In Summary : Fossil hunters are launching an Antarctic expedition to learn how fish developed into land animals. [...] kindly refer the fol...

item-thumbnail

This Thanksgiving, Ditch the Food Psychology

In Summary : Cornell scientist Brian Wansink rocketed to fame by crafting easy, appealing rules on how to avoid overeating. Turns out, tho...

item-thumbnail

How To Change GDM Login Screen Background In Ubuntu

In Summary : This brief guide describes how to change GDM Login screen background in Ubuntu 18.04 LTS desktop operating system. [...] kindl...

item-thumbnail

Mini-Internet using LXC

In Summary : Mini-Internet using LXC for practical works. Contribute to flesueur/mi-lxc development by creating an account on GitHub. [...]...

item-thumbnail

Web Browser Address Bar Spoofing

In Summary : This blog post looks at two address bar spoofing incidents. The first involved the Homograph vulnerability, where attackers u...

item-thumbnail

Not So Cozy: An Uncomfortable Examination of a Suspected APT29 Phishing Campaign

In Summary : FireEye detected new targeted phishing activity at more than 20 of our clients across multiple industries. [...] kindly refer ...

item-thumbnail

Office 365 and Azure AD vulnerable to brute-force and password spray attacks

In Summary : Azure AD is the de facto gatekeeper of Microsoft cloud solutions such as Azure, Office 365, Enterprise Mobility. As an integr...

item-thumbnail

Google Inbox recipient spoofing vulnerability

In Summary : One of these screenshots is a draft email to the real PayPal support. The other one is to a scammer. Both screenshots are ide...

item-thumbnail

Write-up about Adobe Flash Player bug patched today

In Summary : TLDR; There’s a bug in Adobe Flash. The interpreter code of the Action Script Virtual Machine (AVM) does not reset a with-sco...

item-thumbnail

Kickstart Application Security on Heroku with the Templarbit Buildpack

In Summary : Heroku remains a popular choice for teams to run their software [...] kindly refer the following link as follow up : https://...

Home index

Ads Max Width 630px

Photos[carousel](6)

Accessories[combine]

ADS

Popular Posts

Random Posts

Flickr Photo

StatCounter

View My Stats