Vipin Singh Sehrawat

5,646 Added | 3 Magazines | 343 Likes | 106 Followers | @vipinsehraw2016 | Keep up with Vipin Singh Sehrawat on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Vipin Singh Sehrawat”

200,000 Cisco Network Switches Reportedly Hacked

sponsored by<p>What Remediation Steps Should Be Taken? Geetha Nandikotkur (AsiaSecEditor) • April 9, 2018<p>Over 200,000 Cisco network switches worldwide …

Information Security

Single single-sign-on SNAFU threatens three Cisco products

Firepower, AnyConnect and ASA appliances and clients need patchesCisco has announced a suite of patches against a bug in its Security Assertion …

Information Security

Threat Actors Turn to Blockchain Infrastructure to Host Hide Malicious Activity

.bit domains are increasingly being used to hide payloads, stolen data, and command and control servers, FireEye says.<p>In a troubling trend for …

Cybersecurity

WebEx vulnerability could spread malware between colleagues

Companies should check they are running latest version of WebEx, and beware attacks via the road less travelled.<p>A critical vulnerability has been …

Information Security

Data leak exposes 48M user profiles scraped from Facebook, Zillow and other sites, researcher says

A cybersecurity firm called UpGuard has tied Facebook — as well as other popular consumer sites — to another data leak.<p>UpGuard’s Chris Vickery …

Security

Amazon Reveals Blockchain Templates for Ethereum and Hyperledger Fabric

At the end of last week Amazon revealed its blockchain templates, which the company claims will make it easier for developers to create …

Blockchain

The importance of inspecting encrypted traffic

Many adversaries to enterprise cybersecurity are using sophisticated encryption tactics to bypass defences and infiltrate networks. Enterprises are …

Information Security

Scientists use graphene to squeeze light to just one atom thick paving the way for tiny switches and sensors

Breakthrough in light compression heralds dawn of a new age of technological possibilities<p>Graphene is regarded as one of the ultimate materials we …

Nanotech

Subdomain enumeration

A friend recently asked me what methods I use to find subdomains. To be honest I was confused, like <i>“oooohhh so much, brute force mmm… zone transfer</i> …

Information Security

Google Chrome: Over 20 Million Users Installed Malware Infected Ad Blockers Into Their Browsers

Ad blocking tools are installed by hundreds of millions of internet users to ward off unwanted ads, intrusive marketing techniques, and to prevent …

Google Chrome

Unstoppable exploit in Nintendo Switch opens door to homebrew and piracy

The Nintendo Switch may soon be a haven for hackers, but not the kind that want your data — the kind that want to run SNES emulators and Linux on their handheld gaming consoles. A flaw in an Nvidia chip used by the Switch, detailed today, lets power users inject code into the system and modify it …

Retrogaming

Antioxidant found to wind back the clock on blood vessel function by up to 20 years

Much mystery surrounds the physiological processes by which humans age, but scientists are learning more all the time. With this knowledge come new …

Wellness

Move Over, Double Helix: A New Form of DNA Has Just Been Discovered

This is the first time it's ever been seen in a living cell.<p>When we learn about human genetics in high school biology class, one of the most basic …

Genetics

Cybersecurity conference exposed attendee info via a garbage app because of course it did

Look, we get it. Cybersecurity is hard. But maybe, just <i>maybe</i>, a conference dedicated to computer security and encryption should know better than to …

Information Security

Lecture Notes | Introduction to Functional Analysis | Mathematics

Lecture notes files.<p>LEC #<p>TOPICS<p>1<p>Linear spaces, metric spaces, normed spaces (PDF)<p>2<p>Linear maps between normed spaces (PDF)<p>3<p>Banach spaces …

Mathematics

Is your Android phone a 'toxic hellstew' of vulnerabilities? There's an app to help you find out

Just because Android tells you it's patched and everything is safe doesn't mean it is. But there's an app to help you determine if you're being told …

Android Phones

Mercury - A Hacking Tool Used To Collect Information And Use The Information To Further Hurt The Target

Mercury is a hacking tool used to collect information and use the information to further hurt the target.<b> <br>Installation</b><br>Requires Python2 …

Forensics

Electrical Substations Exposed to Attacks by Flaws in Siemens Devices

<b>Electrical substations and other power supply facilities are exposed to hacker attacks due to several potentially serious vulnerabilities discovered</b> …

Information Security

Breakthrough: Researchers fix Alzheimer's gene

Groundbreaking research shows, for the first time, how the most well-known genetic risk factor for Alzheimer's disease causes signs in human brain …

Dementia

Near impossible mining speeds on Verge cryptocurrency using new exploit

An unknown hacker exploited a vulnerability in the Verge cryptocurrency platform which allowed an attacker to mine the coin at nearly 1,560 Verge …

Cryptocurrency

AMD has a fix for Spectre variant II, but will motherboard makers support it?

AMD has announced it has begun providing updates for the variant 2 Spectre vulnerability which has affected many generations of its hardware. …

Advanced Micro Devices

‘FakeUpdates’ campaign leverages multiple website platforms

A malware campaign which seems to have started at least since December 2017 has been gaining steam by enrolling a growing number of legitimate but …

Cybersecurity

Windows security: Microsoft patch for Outlook password leak bug 'not a full fix'

Attackers can make Outlook leak password hashes just by previewing an RTF-formatted email.<p><i>Video: When it comes to malware, Windows 10 is twice as</i> …

Information Security

April Patch Tuesday – 63 Microsoft vulnerabilities, 19 for Adobe

Today’s Patch Tuesday is smaller than last month, but there are more critical updates this time. Out of the 63 vulnerabilities covered by the …

Information Security

New Ransomware Locks Your Files Unless You Play 'PUBG'

'I don’t want money! Just play PUBG 7 hours!' the ransomware says.<p>Everyone loves <i>PlayerUnknown's Battlegrounds</i>, and one piece of ransomware seems to love it so much it’s willing to lock down your computer’s files until you spend quality time with the game. First spotted by MalwareHunterTeam and …

Malware

Unpatched Vulnerabilities the Source of Most Data Breaches

New studies show how patching continues to dog most organizations - with real consequences.<p>Nearly 60% of organizations that suffered a data breach in …

Cybersecurity

Researchers Unearth New Malware Designed to Make ATMs Spew Out Cash

Researchers have recently discovered new kind of “jackpotting” malware—the sole purpose of which is forcing ATMs to spit out huge volumes of …

ATMs

Oblivious DNS could protect your internet traffic against snooping

DNS is prone to snooping of personal data, but four Princeton researchers think they've found a way to encrypt everyone's traffic without any changes …

Information Security

Mozilla's first Internet Health Report makes for grim reading

The Internet has never been bigger. Lower costs of getting online, paired with near-ubiquitous cheap smartphones, has meant that more people are connected to the information superhighway than ever. But it’s not all good news.<p>According to Mozilla’s inaugural Internet Health Report, things aren’t …

Fake News

Skeleton Key

The Skeleton Key is a malware which is stored in memory which allows an attacker to authenticate as any domain user in the network by using a master …

Information Security