custom blog

VLC Vulnerability – Tempered Subtitles can give complete control of the system remotely

Subtitle Hack Leaves 200 Million Vulnerable to Remote Code Execution Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles. By crafting malicious subtitle files, which are then downloaded by a victim’s media player, attackers can take complete control over any type of device via vulnerabilities found

By |2018-12-11T11:34:04+00:00December 10th, 2018|custom blog, Web Application Security|

How WannaCry did the damage

WannaCry is the ransomware computer worm that targets computers running Microsoft Windows. Initially, the worm uses the EternalBlue exploit to enter a computer, taking advantage of a vulnerability in Microsoft’s implementation of the Server Message Block (SMB) protocol. It installs DoublePulsar, a backdoor implant tool, which then transfers and runs the WannaCry ransomware package. It

By |2018-12-11T11:33:39+00:00December 10th, 2018|custom blog, Web Application Security|

MongoDB Databases – Targeted by Cyber-criminals for Ransom

In December-2016, attackers were exploiting misconfigured open-source MongoDB databases and holding them for ransom. Bitcoin chart The ransomware attacks against MongoDB were first publicly reported by GDI Foundation security researcher Victor Gevers on Dec. Bitcoin exchange chart 27, 2016, and have been steadily growing ever since, with at least five different groups of hackers taking

By |2018-12-11T11:32:46+00:00December 10th, 2018|custom blog, Web Application Security|

16 years old high school student from Melbourne hacked Apple’s Servers

A 16 years old high school student from Melbourne, Australia, managed to break into Apple servers and downloaded some 90GB of secure files, including extremely secure authorized keys used to grant login access to users, as well as access multiple user accounts. Student told the authorities that he hacked Apple because he was a huge

By |2018-12-11T11:32:17+00:00December 10th, 2018|custom blog, Technology, Web Application Security|

General Data Protection Regulation (GDPR) and Web Application Security

GDPR in Short Any company either based in the EU or which deals with any data involving EU citizens or organizations are required to comply. Under the GDPR, personal data includes anything that might identify an EU citizen, including IP addresses and cookie IDs. Companies will now need to report incidents that could risk customer

By |2018-12-11T11:31:53+00:00December 10th, 2018|custom blog, Web Application Security|

“New Gmail functionality Allows Users to Send Self-destructing Emails” is locked New Gmail functionality Allows Users to Send Self-destructing Emails

The new Gmail allows the user to protect sensitive information by allowing the sender of the email to set an expiration date for each individual message sent to the receiver.       Confidential mode   Users can now enable a 'confidential' option when sending an email which means that recipients can only see the

By |2018-12-11T11:24:17+00:00November 30th, 2018|custom blog|

Chat - SplenGini

SplenGini is Typing...