Latest Security News

Youtube Now Takes Down “Instructional Hacking” Videos

For 19-years and still counting, Youtube has become a very important platform for online video content. Not only for leisure and pleasure, like those cat videos that we all love to watch, but also education-type of videos designed to inform people of whatever topic they wish to learn. In fact, as of this year, there

[ Read More ]

Facebook’s “View As” Fiasco Now Under Trial

Facebook seems like receiving the short end of the stick once more, as a U.S. District Judge William Alsup ruled that the trial of the case against Facebook’s “View As” fiasco of September 2018 will proceed as scheduled. The judge ruled last June 21, denying Facebook’s appeal to junk the case due to lack of

[ Read More ]

What Are The Motivations For Botnet Development?

Any device in the Internet may function as a zombie, a member of a botnet that follows the commands of the botnet malware. Both traditional PCs, servers, smartphone, and IoTs (Internet-of-Things). Botnets are a collection of Internet-connected devices infected with malware. These infected devices are called bots (or zombies). The type of malware that takes

[ Read More ]

Thousands Of Apps In The Play Store Are Trojan Horses

Note: This is a follow-up article of our story regarding Google Play Store that was published earlier. The Data61 team from the University of Sydney and Commonwealth Scientific and Industrial Research Organization (CSIRO) has revealed that Google Play is riddled with malicious cloned apps of the top 10,000 apps. According to Data61 team, they were

[ Read More ]

Vulnerability Management In The Nutshell

In the process of developing and actually using particular software, security vulnerabilities leading to cyber attacks are commonplace. It is a well-known fact that there are a series of cyber-attacks that are perpetuated by malicious people, we report various incidents of cyber attacks and online misbehavior of some parties, to gain an upper hand in

[ Read More ]

Zero-day WordPress Plugin Exploits Irresponsibly Disclosed

WordPress is once again in the headlines of Tech News, as two zero-day exploits have been discovered, both related to how WordPress interacts with Facebook. The first one is Facebook for WooCommerce, is a WordPress plugin which promises to provide an interface between WooCommerce and Facebook. The second plugin is Messenger Customer Chat, as the

[ Read More ]

26-Exploits Loaded To Echobot Botnet, A Big Threat

The computing public is being made aware of an emerging botnet that is currently growing in the wild named Echobot. Considered by Palo Alto Network as the spiritual successor of Mirai botnet, Echobot now comes with an arsenal of 26 exploits designed to take over Internet-connected devices, now including a module to infect IoT and

[ Read More ]

Machine Learning With Threat Analytics Helps Stop Security Breaches

It is time to bring in some clarity about the gravity of the crimes that are happening today around the world. A common misconception or fiction is that millions of hackers have turned to the dark side and are organizing massive attacks against any vulnerable company. The facts reflect a much more brutal truth that

[ Read More ]

A First Look At Hacking Campaign Vs Exim Servers

The Internet, including both the surface web and the Dark Web is currently being scanned by cybercriminals looking for vulnerable Exim servers, which currently has 57% market share of all existing email servers in the world. The Exim email server flaw documented under CVE-2019-10149 enables hackers to send malformed emails to a target Exim server

[ Read More ]

5 Features Of Android To Aid Pen Testing

We are living in a different world now compared to 10 years ago. Before, the most important thing for a developer to reach is a working-state for his/her application. The program needs to run without crashing, regardless of what video card, amount of memory, processor clock speed and the storage used in the computer where

[ Read More ]