Gabi S

3,118 Flips | 6 Magazines | 88 Likes | 6 Following | 6,567 Followers | @unreal2frag | I am a passionate developer that enjoys everything about tech, programming, security in today's world.

PowerPool malware exploits ALPC LPE zero-day vulnerability

Malware from newly uncovered group PowerPool exploits zero-day vulnerability in the wild, only two days after its disclosureThe post PowerPool …

Cybersecurity

How to build an image recognition app in React Native in 30 minutes

For a few months now I've been fascinated by React Native, and having already done some development in the Ionic framework I was excited by how well …

JavaScript

The ultimate guide to finding and killing spyware and stalkerware on your smartphone

Surveillance isn't just the purview of nation-states and government agencies -- sometimes, it is closer to home.<p>Our digital selves, more and more, …

Spyware

Cisco warns customers of critical security flaws, advisory includes Apache Struts

The massive security update includes a patch for the recently-disclosed Apache bug -- but not all products will be fixed yet.<p>Cisco has issued a …

Information Security

15-year-old Mac security flaw left millions of Apple customers vulnerable to hackers

Apple customers have been warned that they may have been exposed to hackers “hiding in plain sight” on their Mac devices after a 15-year-old vulnerability was discovered by a cyber security researcher.<p>The exploit could allow a hacker to install malicious software on devices like MacBooks to access …

North Korea's hackers—many living abroad—have nabbed it $650 million

North Korea has gradually become a hacking superpower, and has earned a pretty penny in the process.<p>Agents acting on behalf of the ruling regime have stolen about $650 million through cyberattacks, according to research from Simon Choi, a consultant to South Korea’s CIA-esque National Intelligence …

IDG Contributor Network: Cybercriminals impersonate popular file sharing services to take over email accounts

The chances of you opening, clicking or downloading a document sent from a colleague or friend are much higher than acting on an email from someone …

Identity Theft

Chrome Has a Built In Malware Scanner, Here’s How to Use It

Lots of malware tries to bog down your browser, but Google Chrome isn’t defenseless—on Windows there’s a built-in scanner called Cleanup.

Malware

Active Defense and “Hacking Back”: A Primer

THE 30-DAY FREE ACCESS TO THIS BIG IDEA HAS EXPIRED.<p>Only HBR subscribers enjoy unlimited access to the Big Idea archives as well as more than 4,000 articles of groundbreaking business thinking.<p>SUBSCRIBE NOW<p>Sign in with your subscription<p>NO THANKS, TAKE ME TO THE HOMEPAGE<p>BIG IDEA PROGRAMS ARE A …

This new virus can hack stored credit card details saved in your internet browser

Chrome and Firefox users listen up!<p>Saving your credit or debit card details in your internet browser definitely saves you time and effort when …

Sick of Passwords? Here's How Blockchain Can Help, and Enhance Cybersecurity, to Boot.

The blockchain revolution includes white hat hackers banding together and the promise of no more passwords.<p>Opinions expressed by <i>Entrepreneur</i> contributors are their own.<p>Financial institutions, credit agencies, major corporations and small businesses are all in the news on a regular basis for …

Five Things To Tackle Before Jumping Into AI

It seems like every day there is a new article or story about artificial intelligence (AI). AI is going to take over all of the jobs. AI is going to do all of the repetitive, menial tasks carried out by admins on a daily basis. AI is going to rise up and take over. AI is not going to take over but …

Artificial Intelligence

All Things React

Discover everything from the basics to the cutting-edge of React - Render Props, Context API, Suspense, CSS-in-JS, Progressive Web Apps, UI Libraries …

JavaScript

Disconnect helps you escape online trackers and conserve your battery

popsci shop<p>Get lifetime privacy protection for just $41.<p>After the Facebook scandal, many of us are thinking more carefully about online privacy. If you want to block the trackers and stay secure, Disconnect is probably your best option. This all-in-one privacy app and VPN service keeps your digital …

Privacy

Comcast is (update: was) leaking the names and passwords of customers’ wireless routers

Comcast has just been caught in a major security snafu: revealing the passwords of its customers’ Xfinity-provided wireless routers in plaintext on the web. Anyone with a subscriber’s account number and street address number will be served up the Wi-Fi name and password via the company’s Xfinity …

Student awarded $36,000 for remote execution flaw in Google App Engine

The discovery was made by a university student who was not aware of how dangerous the vulnerability was.<p>Google has awarded a young cybersecurity …

Information Security

Google and Microsoft disclose new CPU flaw, and the fix can slow machines down

New firmware updates are on the way<p>Microsoft and Google are jointly disclosing a new CPU security vulnerability that’s similar to the Meltdown and Spectre flaws that were revealed earlier this year. Labelled Speculative Store Bypass (variant 4), the latest vulnerability is a similar exploit to …

Confused about parentheses and brackets? Here’s help

Parentheses and brackets set off portions of text from the whole for various purposes.Parentheses, appearing almost exclusively in pairs, are usually …

Framing

New A.I. application can write its own code

Computer scientists have created a deep-learning, software-coding application that can help human programmers navigate the growing multitude of …

Police take down the world's largest DDoS-for-hire service

WebStresser launched denial of service attacks for as little as $15.<p>The internet might be slightly safer against distributed denial of service attacks in the near future... slightly. Police in twelve countries have taken down WebStresser, believed to be the world's largest service for paid DDoS …

Britain braces for Russian cyber attacks targeting transport links, water supplies, hospitals and airports

Britain was tonight braced for a wave of crippling cyber attacks in Russian retaliation for the Syrian missile strikes.<p>Vital transport links, water …

validatorjs

README.md<p>The validatorjs library makes data validation in JavaScript very easy in both the browser and Node.js. This library was inspired by the …

Cyber-Espionage Groups Are Increasingly Leveraging Routers in Their Attacks

Cyber-espionage groups —also referred to as advanced persistent threats (APTs)— are using hacked routers more and more during their attacks, …

Bug hunters: The hackers earning big bucks... ethically

<b>The term hacker is often used pejoratively, but the ability to spot weaknesses in companies' software and cyber-security systems is in high demand. Ethical hackers are now earning big bucks and the industry is growing.</b><p>James Kettle is a bug hunter - not of the insect kind, but of software.<p>He scans …

Four telcos set up global cybersecurity group

Singtel, SoftBank, Etisalat, and Telefónica have banded to form the Global Telco Security Alliance, pledging to share data on cyber threats and tap …

Ethereum Smart Contracts in Python: a comprehensive(ish) guide

It’s one thing to get a basic smart contract up on Ethereum — just google “ERC20 Token Tutorial” you’ll find plenty of information on how to do it. …

Two Years of Functional Programming in JavaScript: Lessons Learned

The article is not about learning FP principles or JavaScript FP libraries. There are numerous of good articles on this topic out there. The article …

How To: Attack Web Applications with Burp Suite & SQL Injection

Web applications are becoming more and more popular, replacing traditional desktop programs at an accelerated rate. With all these new apps out on …

New MacOS Backdoor Linked to OceanLotus Found

We identified a MacOS backdoor (detected by Trend Micro as OSX_OCEANLOTUS.D) that we believe is the latest version of a threat used by OceanLotus …

Computer Exercises in Nonlinear Systems

Background<p>Small world networks were inspired by the sociological phenomenon of "six degrees of separation": the network of human friendships is …