Latest Security News

RubyGems Strong_Password Lib Infiltrated By Hackers

The Ruby library is ubiquitous, it is everywhere, as proven by the number of loyal developers it attracted to the platform for decades. With the availability of its library for various operating systems, it is one of the most cross-compatible programming languages today which is highly underrated. However, recently, the use of Ruby needs to

[ Read More ]

China’s BXAQ Spy App For Tourists of Xinjiang Questioned

Are you planning or already booked for a China-trip anytime soon? Then this is the news you cannot ignore, China’s border immigration agents at Xinjiang region are legally compelled to demand for tourists’ smartphone and its corresponding unlock codes before allowed entry. The confiscated smartphone will be returned to the tourist as soon as the

[ Read More ]

Is Mozilla Stubborn? 17-Year Old Bug, Still Unpatched

Open-source apps have long been hailed for being more secure than proprietary software, for the reason that the availability of the source code means the higher chances that a bug can be seen easier. But this is not consistent, there are times the feature that has a bug for years is not a commonly used

[ Read More ]

Youtube Now Takes Down “Instructional Hacking” Videos

For 19-years and still counting, Youtube has become a very important platform for online video content. Not only for leisure and pleasure, like those cat videos that we all love to watch, but also education-type of videos designed to inform people of whatever topic they wish to learn. In fact, as of this year, there

[ Read More ]

Facebook’s “View As” Fiasco Now Under Trial

Facebook seems like receiving the short end of the stick once more, as a U.S. District Judge William Alsup ruled that the trial of the case against Facebook’s “View As” fiasco of September 2018 will proceed as scheduled. The judge ruled last June 21, denying Facebook’s appeal to junk the case due to lack of

[ Read More ]

What Are The Motivations For Botnet Development?

Any device in the Internet may function as a zombie, a member of a botnet that follows the commands of the botnet malware. Both traditional PCs, servers, smartphone, and IoTs (Internet-of-Things). Botnets are a collection of Internet-connected devices infected with malware. These infected devices are called bots (or zombies). The type of malware that takes

[ Read More ]

Thousands Of Apps In The Play Store Are Trojan Horses

Note: This is a follow-up article of our story regarding Google Play Store that was published earlier. The Data61 team from the University of Sydney and Commonwealth Scientific and Industrial Research Organization (CSIRO) has revealed that Google Play is riddled with malicious cloned apps of the top 10,000 apps. According to Data61 team, they were

[ Read More ]

Vulnerability Management In The Nutshell

In the process of developing and actually using particular software, security vulnerabilities leading to cyber attacks are commonplace. It is a well-known fact that there are a series of cyber-attacks that are perpetuated by malicious people, we report various incidents of cyber attacks and online misbehavior of some parties, to gain an upper hand in

[ Read More ]

Zero-day WordPress Plugin Exploits Irresponsibly Disclosed

WordPress is once again in the headlines of Tech News, as two zero-day exploits have been discovered, both related to how WordPress interacts with Facebook. The first one is Facebook for WooCommerce, is a WordPress plugin which promises to provide an interface between WooCommerce and Facebook. The second plugin is Messenger Customer Chat, as the

[ Read More ]

26-Exploits Loaded To Echobot Botnet, A Big Threat

The computing public is being made aware of an emerging botnet that is currently growing in the wild named Echobot. Considered by Palo Alto Network as the spiritual successor of Mirai botnet, Echobot now comes with an arsenal of 26 exploits designed to take over Internet-connected devices, now including a module to infect IoT and

[ Read More ]