1,300+ Apps Bypass Android Permission Restrictions
Android 6.0 Marshmallow (and later) is hailed for giving its default user the capability to grant/deny granularly the permissions asked by apps, something that only rooted/custom roms users were able to do prior. However, contrary to the permissions feature, a study conducted by the University of Calgary, U.C. Berkeley, Universidad Carlos III de Madrid and
[ Read More ]Alternative Secure Email Infra For The Enterprise
Firms should always consider the worst-case scenario in their internal IT environment. The need to put in place procedures in the event of a disaster, and periodically update these procedures in order to be relevant to the current trends. IT leaders need to devise ways, a detailed description of what to do when the malware
[ Read More ]Mac’s Zoom Client Camera Bug Discovered, Patch Required
Since webcams came into existence the product came with a huge “if”. The possibility of some other people accesses the webcam online when they least expect it. Webcams exploded in popularity in the late ‘90s, primarily for use in conjunction with early instant messaging services such as Yahoo and ICQ. Today, webcams are highly integrated
[ Read More ]RubyGems Strong_Password Lib Infiltrated By Hackers
The Ruby library is ubiquitous, it is everywhere, as proven by the number of loyal developers it attracted to the platform for decades. With the availability of its library for various operating systems, it is one of the most cross-compatible programming languages today which is highly underrated. However, recently, the use of Ruby needs to
[ Read More ]China’s BXAQ Spy App For Tourists of Xinjiang Questioned
Are you planning or already booked for a China-trip anytime soon? Then this is the news you cannot ignore, China’s border immigration agents at Xinjiang region are legally compelled to demand for tourists’ smartphone and its corresponding unlock codes before allowed entry. The confiscated smartphone will be returned to the tourist as soon as the
[ Read More ]Basic Guide To Prevent Virus Infection
Here, we often interchange the word “virus” with the word “malware”. It is for the purpose of simplicity, as we focus our article to the actual story rather than falling for defining the types of nasty software that was involved in the news. In this article, we provide you a quick glimpse of all malware
[ Read More ]Is Mozilla Stubborn? 17-Year Old Bug, Still Unpatched
Open-source apps have long been hailed for being more secure than proprietary software, for the reason that the availability of the source code means the higher chances that a bug can be seen easier. But this is not consistent, there are times the feature that has a bug for years is not a commonly used
[ Read More ]Fundamentals Of A DDoS Attack
Distributed Denial of Service Attack (DDoS) is a critical cybersecurity concern that causes a service to stop by sending numerous processing requests from multiple computers to a target server over the network. DDoS basically is an expansion of the DoS attack, when multiple computers make simultaneously request service from a certain target in an effort
[ Read More ]Turkey Gov’t: Marriott Hotel’s Fine Due To Data Breach
The Marriott Hotel chain data breach is one of our most covered Cybersecurity stories about Beijing denying the accusation from western powers that it was behind the data breach. We revisit this story, with Turkey imposing a hefty fine against the Marriott Hotel International firm to the tune of 1.5 million Turkish Lira (US$267,352). The
[ Read More ]Youtube Now Takes Down “Instructional Hacking” Videos
For 19-years and still counting, Youtube has become a very important platform for online video content. Not only for leisure and pleasure, like those cat videos that we all love to watch, but also education-type of videos designed to inform people of whatever topic they wish to learn. In fact, as of this year, there
[ Read More ]