Gabi S

3,098 Added | 6 Magazines | 88 Likes | 6 Following | 6,296 Followers | @unreal2frag | I am a passionate developer that enjoys everything about tech, programming, security in today's world.

Britain braces for Russian cyber attacks targeting transport links, water supplies, hospitals and airports

Britain was tonight braced for a wave of crippling cyber attacks in Russian retaliation for the Syrian missile strikes.<p>Vital transport links, water …

Middle East

validatorjs

The validatorjs library makes data validation in JavaScript very easy in both the browser and Node.js. This library was inspired by the Laravel …

Cyber-Espionage Groups Are Increasingly Leveraging Routers in Their Attacks

Cyber-espionage groups —also referred to as advanced persistent threats (APTs)— are using hacked routers more and more during their attacks, …

Cybersecurity

Bug hunters: The hackers earning big bucks...ethically

<b>The term hacker is often used pejoratively, but the ability to spot weaknesses in companies' software and cyber-security systems is in high demand. Ethical hackers are now earning big bucks and the industry is growing.</b><p>James Kettle is a bug hunter - not of the insect kind, but of software.<p>He scans …

Cybersecurity

Four telcos set up global cybersecurity group

Singtel, SoftBank, Etisalat, and Telefónica have banded to form the Global Telco Security Alliance, pledging to share data on cyber threats and tap …

Cybersecurity

Ethereum Smart Contracts in Python: a comprehensive(ish) guide

It’s one thing to get a basic smart contract up on Ethereum — just google “ERC20 Token Tutorial” you’ll find plenty of information on how to do it. …

Blockchain

Two Years of Functional Programming in JavaScript: Lessons Learned

The article is not about learning FP principles or JavaScript FP libraries. There are numerous of good articles on this topic out there. The article …

Programming

How To: Attack Web Applications with Burp Suite & SQL Injection

Web applications are becoming more and more popular, replacing traditional desktop programs at an accelerated rate. With all these new apps out on …

Information Security

New MacOS Backdoor Linked to OceanLotus Found

We identified a MacOS backdoor (detected by Trend Micro as OSX_OCEANLOTUS.D) that we believe is the latest version of a threat used by OceanLotus …

Cybersecurity

Computer Exercises in Nonlinear Systems

Background<p>Small world networks were inspired by the sociological phenomenon of "six degrees of separation": the network of human friendships is …

Python Programming

Chrome Is Scanning Files on Your Computer, and People Are Freaking Out

Some cybersecurity experts and regular users were surprised to learn about a Chrome tool that scans Windows computers for malware. But there’s no reason to freak out about it.<p>The browser you likely use to read this article scans practically all files on your Windows computer. And you probably had …

Malware

MIT's wearable device can 'hear' the words you say in your head

If you've read any sort of science fiction, it's likely you've heard about subvocalization, the practice of silently saying words in your head. It's common when we read (though it does slow you down), but it's only recently begun to be used as a way to interact with our computers and mobile …

Wearable Tech

Delta and Sears hit by cybersecurity breach

If you're a frequent flyer or shop in bargain basements, your credit card info may have been compromised.<p>Delta Air Lines Inc. and Sears Holding Corp. …

Customers

Your ISP can peep on your browsing, so Cloudflare is pulling down the shade

Cloudflare has introduced a new service called 1.1.1.1 that claims to be a faster, safer way to use the internet. In a week of headlines that include …

Net Neutrality

Verge cryptocurrency hack shows, no, blockchain isn't invincible

Privacy-oriented cryptocurrency Verge (symbol: XVG) was apparently hacked Wednesday, with the attacker making off with around 250,000 coins with a …

Bitcoin

11 Dangerous Data Breaches That Should Freak You Out

In recent decades, we've seen some of the most secure servers in the world breached by black hats.<p>PCMag reviews products independently, but we may …

Cyberwarfare

This 9-course comprehensive coding bundle is on super-sale

Coding is a competitive career track that changes quickly. If you want to stay on the bleeding edge of the industry, you’re going to need to learn …

Programming

Blockchain Is the Future, But It's Confusing. Here's an Explanation in Plain English

Blockchain. If you're like me a year ago, the mere mention might make you go "huh?"<p>Blockchain. If you're like me a year ago, the mere mention might make you go "huh?"<p>You keep hearing the word and it isn't going away. You admit defeat of your lack of knowledge and find yourself Googling "What is …

Blockchain

Hackers have taken down dozens of 911 centers. Why is it so hard to stop them?

America’s emergency-response networks remain dangerously vulnerable to criminals bent on crippling the country’s critical infrastructure.<p>When news broke last week of a hacking attack on Baltimore’s 911 system, Chad Howard felt a rush of nightmarish memories.<p>Howard, the information technology …

Cybersecurity

Cracking Passwords up to 256 Characters with Hashcat

Think your 12 character passwords are still strong enough? One of the top password cracking programs can now crack password up to 256 characters!The …

Information Security

Chrome Is Scanning Files on Your Computer, and People Are Freaking Out

Some cybersecurity experts and regular users were surprised to learn about a Chrome tool that scans Windows computers for malware. But there’s no reason to freak out about it.<p>The browser you likely use to read this article scans practically all files on your Windows computer. And you probably had …

Malware

11 Beginner Tips for Learning Python Programming

We are so excited that you have decided to embark on the journey of learning Python! One of the most common questions we receive from our readers is</i> …

Python Programming

How to Hack Wi-Fi: Hunting Down & Cracking WEP Networks

While the security behind WEP networks was broken in 2005, modern tools have made cracking them incredibly simple. In densely populated areas, WEP …

Information Security

DHS Suspects Mystery Phone-Tracking Devices Have Been Deployed in Washington, DC

The US Department of Homeland Security (DHS) has acknowledged for the first time that cellphone surveillance equipment may have been deployed in the …

Surveillance

Cybersecurity: How to devise a winning strategy

Cybersecurity incidents and breaches can seriously damage a company, making it imperative that security risk management is integral to corporate …

Cybersecurity

How Blockchain is Disrupting the Accounting Industry

Blockchain could be coming for the accounting industry.<p>Blockchain is arguably one of the most discussed technologies of 2018, and there's a reason for that. As a sort of indestructible and incorruptible ledger, it offers a new way to store and share data in such a way that it's simultaneously …

Blockchain

Hacking Windows 10: How to Capture & Exfiltrate Screenshots Remotely

Screenshots taken from a compromised computer can provide hackers with access to private emails, photographs, and information found in sensitive …

Linux

An exclusive look behind the scenes of the U.S. military’s cyber defense

<b>Judy Woodruff:</b><p>But, returning to the murky world of cyber-attacks, and defense, the newest U.S. military command is responsible not for a piece of …

Cybersecurity

Cisco critical flaw: At least 8.5 million switches open to attack, so patch now

Cisco patches a severe flaw in switch deployment software that can be attacked with crafted messages sent to a port that's open by default.<p>Cisco has …

Information Security

Nvidia just unveiled a terrifying AI supercomputer

Nvidia has unveiled several updates to its deep-learning computing platform, including an absurdly powerful GPU and supercomputer.<p>At this year's GPU …

Artificial Intelligence