Do You Have A Software Project Or Idea We Can Help With?

Get Free Consultation

Security Header : Why X-XSS Protection is important

What is X XSS protection? The HTTP X-XSS-Protection response header is a feature of Internet Explorer, Chrome and Safari that stops pages from loading when they detect reflected cross-site scripting (XSS) attacks. This header enables the Cross-site scripting (XSS) filter built into most recent web browsers. It’s usually enabled by default anyway, so the role of this header is to re-enable the filter for this particular website if it was

December 10th, 2018|Tags: , , , |

webRTC – Future is Here

What is webRTC WebRTC (Web Real Time Communication) is an Application Programming Interface (API) developed by the W3C that is still on development and being standardized by the RTCWEB IETF group. Its main goal is to allow peer-to-peer communication between web browsers. This communication can be used to transfer multiple type of data: files, video or audio.   Why it is important WebRTC is an API that allows you set

One step towards changing the world

Research Team is working to make this place better and safer Once upon a time, an old man walked down a Spanish beach at dawn, he saw ahead of him what he thought to be a dancer. The young man was running across the sand, rhythmically bending down to pick up a stranded starfish and throw it far into the sea. The old man gazed in wonder as the young

December 10th, 2018|Tags: , , |

SambaCry Vulnerability – Remote Code Execution Vulnerability in Linux

A seven-year-old remote code execution vulnerability that is affecting Samba versions 3.5.0 and higher is making news this week. The vulnerability is billed as the WannaCry equivalent for *nix operating systems, and some are even calling it SambaCry since it affects the SMB protocol implementation and is potentially wormable – which can cause it to spread from system to system. A malicious samba client that has write access to a

December 10th, 2018|Tags: , , , |

VLC Vulnerability – Tempered Subtitles can give complete control of the system remotely

Subtitle Hack Leaves 200 Million Vulnerable to Remote Code Execution Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles. By crafting malicious subtitle files, which are then downloaded by a victim’s media player, attackers can take complete control over any type of device via vulnerabilities found in many popular streaming platforms, including VLC, Kodi (XBMC), Popcorn-Time and It’s common to

December 10th, 2018|Tags: , , |

How WannaCry did the damage

WannaCry is the ransomware computer worm that targets computers running Microsoft Windows. Initially, the worm uses the EternalBlue exploit to enter a computer, taking advantage of a vulnerability in Microsoft’s implementation of the Server Message Block (SMB) protocol. It installs DoublePulsar, a backdoor implant tool, which then transfers and runs the WannaCry ransomware package. It is also being called WanaCrypt0r 2.0. Main Functionality   The WinMain of this executable first

December 10th, 2018|Tags: , , |

Chat - SplenGini

SplenGini is Typing...