Posts

Showing posts with the label Learning

From today, Google Chrome starts marking all non-HTTPS sites 'Not Secure'

Image
Starting today with the release of Chrome 68, Google Chrome prominently marks all non-HTTPS websites as 'Not Secure' in its years-long effort to make the web a more secure place for Internet users. So if you are still running an insecure HTTP (Hypertext Transfer Protocol) website, many of your visitors might already be greeted with a ' Not Secure ' message on their Google Chrome browser warning them that they can't trust your website to be secure. By displaying 'Not Secure,' Google Chrome means that your connection is not secure because there is no SSL Certificate to encrypt your connection between your computer and the website's server. So, anything sent over a non-HTTPS connection is in plain text, like your password or payment card information, allowing attackers to snoop or tamper with your data. The non-https connection has been considered dangerous particularly for web pages that transfer sensitive information—like login pages and paym...

Info Security Can Save Your Identity

Image
Cyber security has become a hot topic throughout businesses and organizations as new technology continues to develop. In the past several years the world has evolved around technology tremendously, making it hard for people to keep up and adapt to it. As new phones, computers, automated tellers, and security devices become familiar around the world; there are also people determined to break into them, as opposed to utilizing them correctly. These people are known as hackers, and they are dangerous. Their intention is to steal, bribe, and or threaten technology users for their information. Safety in the household, at work, and in the economy have increasingly developed into daily task items. Whether that means enabling a home safety device, locking a computer at work, or even encrypting bank information. The number of hackers increases daily around the globe and their actions ranging from spamming your email to as far as stealing encrypted data from banks and capital markets. The U...

Ubuntu Linux for Windows 10 Released

Image
Windows and Linux in the same line? Yes, you heard that right... and that too, on the same computer and within the same operating system. Two months ago, Microsoft announced its plans to let its users install  three different flavours of the Linux  operating system –  Ubuntu ,  Fedora , and  SUSE  – directly through their Windows Store, allowing them to run Windows and Linux apps side-by-side. Now, downloading an entire operating system has just become as easy as downloading an application with the availability of popular Linux distro  'Ubuntu' in the Windows App Store . However, unlike a conventional Ubuntu installation, this Ubuntu version runs in a sandboxed alongside Windows 10 with limited interaction with the operating system and is focused on running regular  command-line utilities like bash or SSH  as a standalone installation through an Ubuntu Terminal. For now, Ubuntu is currently only available to Windows 10 In...

Learning to code using bad web tutorials may be the reason for most security vulnerabilities

Image
The German cybersecurity researchers have found that many security vulnerabilities in many websites could, in fact, be due to people learning to code from popular online tutorials which are riddled with many mistakes. The Computer scientists from the Saarland University, the Technical University of Braunschweig, Technical University of Berlin, and the cybersecurity firm Trend Micro have analysed thousands of PHP programming projects on the  GitHub  and they have cross-referenced the code against a bunch of popular coding tutorials which rank at the top of Google. Most of the popular tutorials online focus on teaching the new coders how to perform a particular task, like how to create a search form in PHP or how to accept the user’s input from a HTML form /message box and output it in the JavaScript; or the tutorials on how to start using an open source database management system like  MySQL . These tutorials offer coding examples that people can copy, but more...

Insecure Apps that Open Ports Leave Millions of Smartphones at Risk of Hacking

Image
A team of researchers from the University of Michigan  discovered  that hundreds of applications in Google Play Store have a security hole that could potentially allow hackers to steal data from and even implant malware on millions of Android smartphones. The University of Michigan team says that the actual issue lies within apps that create open ports — a known problem with computers — on smartphones. So, this issue has nothing to do with your device's operating system or the handset; instead, the origin of this so-called backdoor is due to insecure coding practices by various app developers. The team used its custom tool to scan over 100,000 Android applications and found 410 potentially vulnerable applications — many of which have been downloaded between 10 and 50 Million times and at least one app comes pre-installed on Android smartphones. Here I need you to stop and first let's understand exactly what ports do and what are the related threats. Ports can be ...

100,000+ WordPress webpages defaced as recently patched vulnerability is exploited

Image
Two weeks ago WordPress 4.7.2 was released, and website administrators running self-hosted versions of the hugely popular CMS and blogging platform were advised to update their systems as a matter of urgency. What we didn’t know at the time was just how important that WordPress update was. Last week, WordPress  revealed  that 4.7.2 had secretly included a fix for an undisclosed critical vulnerability. If left unpatched, the vulnerability could allow a malicious attacker to modify the content of any post or page on a WordPress site. The reason the vulnerability wasn’t made public at the time of WordPress 4.7.2’s release was the very real worry that malicious hackers might race to exploit the flaw, attacking millions of blogs and company websites. Security researchers and major WordPress-hosting firms put mitigations in place ahead of the public disclosure in order to mitigate attacks, and it looked as though a bullet might have been dodged – assisted by the fact t...

RoboTryst-2017 IIT Delhi

Image
Tryst  is the annual technical festival of the  Indian Institute of Technology Delhi , held in February and March. The festival is the largest technical fest of North India with a huge footfall of more than 45,000 people around the globe. It is one of the largest and a highly acknowledged technical festival of India .It is entirely organized by the  IIT Delhi  student body and serves as a perfect launch-pad for technology enthusiasts to showcase their intelligence and inventiveness and a massive platform for various activities, organized in the form of competitive events, guest lectures, technical workshops and exhibition.The festival has always been driven by the motivation to bring together the world’s leading scientific minds along with renowned technologists and influential thinkers and connect them to a broader public involving students and faculty across India. Tryst 2017 will be held from 26th Feb – 29th Feb 2017, and will feature an impressive line...