Translate

Monday, 31 December 2018

Ransomware vs. printing press? US newspapers face “foreign cyberattack”

Did malware disrupt newspaper deliveries in major US cities? Here’s what’s known about the incident so far and the leading suspect: Ryuk ransomware. Plus, advice on defending your organization against such attacks.

The post Ransomware vs. printing press? US newspapers face “foreign cyberattack” appeared first on WeLiveSecurity



2018: Research highlights from ESET’s leading lights

As the curtain slowly falls on yet another eventful year in cybersecurity, let’s look back on some of the finest malware analysis by ESET researchers in 2018

The post 2018: Research highlights from ESET’s leading lights appeared first on WeLiveSecurity



Sunday, 30 December 2018

EU Offering Cash Bounty Incentives For Finding Security Flaws in Open Source Tools

The European Union (EU) is back with a third edition of its Free and Open Source Software Audit (FOSSA) plan

EU Offering Cash Bounty Incentives For Finding Security Flaws in Open Source Tools on Latest Hacking News.



Working with Apps in Django

In this tutorial, we’ll learn about:

  1. What is app in django project and why to use it?
  2. How to create app in django project?

So let’s start with very first question.

What is app in django project and why to use it?

We’ve seen that how to create a project in django. Actually each django project consist of some applications where each application have its task to perform. The main advantage to use apps in django is code reusability. If you have designed an app in a project and you need the same functionality to another project that our app is performing. Then you can simply copy and paste our app into another project. Let’s say you have designed a contact form in one website and you want to use the same contact form in another website then you can do it very easily in django.

How to create an app in django project?

In order to create an application in django project, first open command prompt or terminal and navigate to the project folder and type the command given below.

python  manage.py startapp myapp

or if you’re linux or mac user and working with python 3 then type:

python3 manage.py startapp myapp

After entering this command, a folder will be created in your project folder having some files.

Files will be:

  1. py: This file is just to make sure that this file should be treated as package.
  2. admin.py: This file will help us to make the application modifiable while working with the admin interface.
  3. models.py: The models of the application will be stored there. Model means the structure of your app and how it is going to interact with the databases. We’ll discuss more about models in upcoming articles.
  4. tests.py: Unit tests of the app will be stored here.
  5. views.py: views of our application will be stored here.
  6. apps.py: It will contain the name of app to be included to settings.py file and many other things. We’ll see it while making any simple app (for example – blog app).

After creating app we’ve to tell our django project that we’ve made and added an application in our project.

Open your settings.py file and add a path of our newly created app. And edit as:

Working with Apps in Django

If you’re thinking that where that MyappConfig came from? It’s a reference to myapps’s configuration class. You can see it in apps.py file in our myapp folder.

That’s all we have to do to add an app in our django project. But still there is no use of app without its model. So we’ll learn about models in upcoming articles.

If you’ve any problem related to this article please let us know in comment box.

The post Working with Apps in Django appeared first on The Crazy Programmer.



Sitadel – An Open Source Tool for Finding Web Application Vulnerabilities

Sitadel is a python based web application scanner. It’s flexible and has many different scanning options. It can get a

Sitadel – An Open Source Tool for Finding Web Application Vulnerabilities on Latest Hacking News.



Saturday, 29 December 2018

Hackers Attack IPMI Default Passwords to Deploy Ransomware On Linux Servers

BleepingComputer recently exposed a Ransomware variant called JungleSec which affects Linux servers through the IPMI (Intelligent Platform Management Interface). The threat

Hackers Attack IPMI Default Passwords to Deploy Ransomware On Linux Servers on Latest Hacking News.



Amazon’s Guardzilla Found to Have a Critical Vulnerability

Amazon’s highly acclaimed Security System Guardzilla has recently been in news for all the wrong reasons.  The E-Commerce giant’s proprietary

Amazon’s Guardzilla Found to Have a Critical Vulnerability on Latest Hacking News.



Friday, 28 December 2018

Kioptrix 1.0 – Vulnhub CTF Challenge Walkthrough

Kioptrix 1.0 is the first level of the Kioptrix machines CTF challenges. As you can understand this is the easiest

Kioptrix 1.0 – Vulnhub CTF Challenge Walkthrough on Latest Hacking News.



Analysis of the latest Emotet propagation campaign

An analysis of the workings of this new Emotet campaign, which has affected various countries in Latin America by taking advantage of Microsoft Office files to hide its malicious activity

The post Analysis of the latest Emotet propagation campaign appeared first on WeLiveSecurity



Thursday, 27 December 2018

Latest Hacking News Podcast #191

A Microsoft Edge remote code execution exploit has been published, the FTC issues Netflix phishing scam warning, a home video surveillance system allows users to access other users' videos, and BevMo suffered payment card breach on episode 191 of our daily cybersecurity podcast.

Latest Hacking News Podcast #191 on Latest Hacking News.



Tips To Spot A Phishing Or Spoofing Email

Even if you have security software, phishing emails will leave exposed to ransom wares. The phishing emails have become too common nowadays. This has continued to cost businesses and individuals a lot of money. Cyber criminals use phishing emails to get access to private and confidential information such as your passwords, credit cards, and other private information. Other than phishing emails, hackers use phone calls, social media to steal your private information. Do not fall victim to these online scams. You need to know what phishing emails look like to stay safe. Companies should be able to block these spoofing emails before they reach their customers. The following phishing awareness tips will help you identify these emails:

Tips To Spot A Phishing Or Spoofing Email

1. Never Trust The Display Name

Most hackers use a common strategy which is to trick the display name of the email. These emails may look legitimate, but it if looks suspicious just flag it off. Do not trust the display name.

2. Poor Grammar and Spelling Mistakes

Most phishing emails are full of grammatical errors and spelling mistakes. Legitimate companies would never send out emails or information with grammar and spelling mistakes. If you receive an email with these mistakes, it should raise your suspicion. If you get suspicious about it, do not click it.

3. Seeking Personal Information

Regardless of how genuine an email may look, never click on an email that requests you for your personal information. Legitimate accounts will not bother you asking for your account number when they already have it. They will request you for passwords or credit card numbers. If you get an email requesting for such kind of information, know that it phishing. Never share your private information with anybody most especially online.

4. The Offer Sounds Too Good

If you receive these emails with offers that are too good to be true. Please avoid them.  These emails have unrealistic promises that turn out to be nothing but just a trick. Another way you can point out a scam is if they address you as ‘esteemed customers’, “valued customer”, “sir/madam” or any other phrase. Legitimate emails from genuine companies will personalize the message. They will address you by your name.

5. Threatening and Urgent Messages

Hackers will send messages that claim that your account has been hacked and that you should urgently follow a link to restore it. This asks you for personal information. Legitimate companies do not ask you for personal information over the internet even if your account was closed. Cyber criminals use the tactic of urgency to instill fear in you and so that you can act promptly.

6. Check the Signature or Contacts

A legitimate company will give you a way to contact them back in their emails. Additionally, messages sent by genuine companies do have signatures. One of the ways you can identify a phishing email is if it lacks these two important aspects.

7. Always Double Check

Do not believe everything you see. No matter how much the email is convincing, ensure that you double check. You can contact your service providers where necessary just to make sure it is from them. If you are suspicious about the email, again do not open it.

8. Never Click The Attachments

Hackers use malicious attachments with malware and viruses. If you click them they damage your files in the computer, retrieve your passwords and monitor you without your knowledge. Do not click on these attachments that you do not their origin.

You need to protect yourself from cyber criminals by being vigilant. Read more phishing awareness tips to help you stay safe.

The post Tips To Spot A Phishing Or Spoofing Email appeared first on The Crazy Programmer.



Winpayloads – An Open Source Tool for Generating Windows Payloads

Winpayloads is a python based tool which combines some of the Powershell Empire features along with the metasploit framework to

Winpayloads – An Open Source Tool for Generating Windows Payloads on Latest Hacking News.



What should you do with your old devices

Disposal of old tech requires thought and effort and the need to cleanse the device of any personal data is just one of the concerns

The post What should you do with your old devices appeared first on WeLiveSecurity



Wednesday, 26 December 2018

Data Visualization in R

R programming was developed in 1993 for making graphs and producing statistical results. There are many libraries in R language that can be used for making graphs and producing statistical data.

There are many steps that have to be taken into consideration for doing data analysis through this language. These steps are:

  • Programming
  • Transforming
  • Discovering
  • Modeling
  • Communicating

R programming is being used in many industries like academics, healthcare, government, insurance, retail, media, manufacturing, etc.

This data analysis can be done through programming in R language which comes with a number of packages having many inbuilt functions and this is the reason that developers do not have to program much. They just need to use those functions and carry out the analysis.

Why R Programming?

R Programming can be used to create statistics and graphs. The language has become very popular and people who want to make their career in this language can undergo R certification online through various institute who provide in-depth knowledge of R.

R certification when seen today can prove to be very useful for students and they can plan a good career after the certification which certainly gives an individual an upper edge over others.

Data Visualization in R

Many types of data visualizations can be created through the language and these are:

  • Histogram
  • Bar / Line Chart
  • Box plot
  • Scatter plot
  • Heat Map
  • Mosaic Map
  • Map Visualization
  • 3D Graphs
  • Correlogram

These will be discussed one by one.

Histogram

A histogram can be created by using histdata package that has many small data sets to create the histogram. A histogram can be used to break data into bins and show their frequency. Here is the code in which histogram is created. Here is the code of creating a simple histogram.

hist(Temperature,
main="Maximum daily temperature ",
xlab="Temperature in degrees Fahrenheit",
xlim=c(50,100),
col="darkmagenta",
freq=FALSE
)

Histogram with R

Image Source

While creating a histogram a developer can see that number of colors specified is more than the number of breaks. The colors are repeated if the number of colors is more.

Line Chart

A line chart shows an increase in the data for a given time period. Line charts are created to compare the changes between two organizations or between weather of two places or other comparisons. Line charts are also created to analyze the trends over a particular period.

x <- c(1:5); y <- x
par(pch=22, col="red")
par(mfrow=c(2,4))
opts = c("p","l","o","b","c","s","S","h")
for(i in 1:length(opts)){
  heading = paste("type=",opts[i])
  plot(x, y, type="n", main=heading)
  lines(x, y, type=opts[i])
}

Line Chart in R

Image Source

Bar Chart

Bar chart is also created for comparing profits or weather report or other comparisons. The chart is displayed in the form of bars. Here is the code of creating a vertical bar chart.

counts <- table(mtbikes$gear)
barplot(counts, main="Bike Distribution",
   xlab="Number of Gears")

Bar Chart in R

Image Source

Here is an example of creating a horizontal bar chart.

counts <- table(mtbikes$gear)
barplot(counts, main="Bike Distribution", horiz=TRUE,
  names.arg=c("3 Gears", "4 Gears", "5 Gears"))

Box Plot

It is created either for a single variable or a group of variables. The syntax of creating a box plot is as follows

boxplot(x,data=)

Here x is the formula and data= is the frame which provides the data. Here is an example of creating a box plot.

boxplot(mpg~cyl,data=mtbikes, Bike Milage Data",
   xlab="Number of Cylinders", ylab="Miles Per Gallon")

Box Plot in R

Image Source

Scatter Plot

Scatter plot can be created in many ways. The basic formula for creating the scatter plot is

plot(x, y)

Here is an example of creating a scatter plot.

attach(mtbikes)
plot(wt, mpg, main="Scatterplot Example",
   xlab="Bike Weight ", ylab="Miles Per Gallon ", pch=19)

Heat Map

A heat map is displayed in the form of a table in which colors are displayed in place of numbers. All the columns can have either same or different colors. The dark color denotes highs while the light colors denote lows. Here is an example of creating a heat map.

> heatmap(as.matrix(mtcars))

Mosaic Map

Mosaic Map can be created by using VCD library which has an ample amount of functions to create the map. The syntax for creating a mosaic map is as follows:

mosaic(x, condvar=, data=)

Here x is the formula and codevar is an optional variable in which conditions can be defined. The example below shows the making of a mosaic map

library(vcd)
mosaic(HairEyeColor, shade=TRUE, legend=TRUE)

3D Graphs

R programming can be used to create 3D graphs which are very impressive. The R commander package is used to create these graphs. In order to create the 3D graph R commander package has to be installed and then 3D plot option should be used in the graph.

Here is the code for creating the graph:

>data(iris, package="datasets")
>scatter3d(Petal.Width~Petal.Length+Sepal.Length|Species, data=iris, fit="linear"
>residuals=TRUE, parallel=FALSE, bg="black", axis.scales=TRUE, grid=TRUE, ellipsoid=FALSE)

Lattice package can also be used to create 3D graphs.

Here is an example

>attach(iris)
>cloud(Sepal.Length~Sepal.Width*Petal.Length|Species, main="3D Scatterplot by Species")
>xyplot(Sepal.Width ~ Sepal.Length, iris, groups = iris$Species, pch= 20)

Correlogram

Correlogram helps the users to view the data in the form of matrices. The syntax for creating a correlogram is given below.

corrgram(x, order = , panel=, lower.panel=, upper.panel=, text.panel=, diag.panel=)

Here

Order=TRUE will set the variables in proper order in relation to the correlation matrix.

Panel= refers to diagonal panels in which developers can use lower= and upper=. These options can be chosen below and above the diagonal. Text.panel and diag.panel are the references to main diagonal.

Here is an example of creating a correlogram.

library(corrgram)
corrgram(mtbikes, order=TRUE, lower.panel=panel.shade,
  upper.panel=panel.pie, text.panel=panel.txt,
  main="Bike Milage Data in PC2/PC1 Order")

Map Visualization

This is the latest thing that has been put into the R programming. R can provide the map visualization through JavaScript libraries. The leaflet is open source through which JavaScript libraries can be used for creating interactive maps. In order to use the library, it should be installed.

library(magrittr)
library(leaflet)
m <- leaflet() %>%
addTiles() %>%
addMarkers(lng=77.2310, lat=28.6560, popup="The delicious food of India")
m

Hexbin

Hexbin is a package, which helps to create multiple points This package can be used to create a bivariate histogram. Here is the code for the same.

>library(hexbin)
>a=hexbin(diamonds$price,diamonds$carat,xbins=40)
>library(RColorBrewer)
>plot(a)

Final Verdict

It can be said that various kinds of graphs can be made from R language by writing few lines of code and embedding packages and functions, which have already been coded.

These charts can be used on the web as well as desktop applications and can help you for data visualization in R in a specific way.

The post Data Visualization in R appeared first on The Crazy Programmer.



Sunday, 23 December 2018

Latest Hacking News Podcast #190 – Interview with Karl Sigler of Trustwave

Latest Hacking News Podcast interview with Karl Sigler, Security Research Manager for Trustwave SpiderLabs, regarding Trustwave's recent disclosure of a Zero-Day vulnerability impacting IBM Trusteer Rapport for MacOS.

Latest Hacking News Podcast #190 – Interview with Karl Sigler of Trustwave on Latest Hacking News.



6 Ways to Perfect the UI of Your Mobile App

One of the biggest headaches mobile app programmers face is how to make their app stand out from the rest. It’s a valid concern since the average app will be coming up against tens or hundreds of applications already in the market that do almost the same thing.

Whereas making sure the app has the functionality users expect is vital, it’s the softer considerations such as the user interface (UI) that often determine what app a user will prefer.

The UI gives the user a perception of how effective the app is. Here are some tips on designing a quality UI for your mobile app.

6 Ways to Perfect the UI of Your Mobile App

1. Think About the UI Right from Initial App Design

You are more likely to build a quality UI if you incorporate it in app design from the start. Create sketches that visualize navigational flow from the end user’s perspective. Pen and paper sketches will suffice at this early stage.

You could have several UI sketches and narrow down to a final two that seem the most feasible. Once you’ve built the nuts and bolts of the app, you can have two versions of the app as prototypes based on the final two sketches. Test out the two with a limited audience to see which one is most popular with users.

2. Maintain Consistency

Your mobile app will have multiple screens such as the home screen, settings screen and user registration screen. Once you’ve settled on a specific design and style for your UI, you must apply it consistently to every screen within the app.

If design, typology and colors change whenever the user switches to a different screen, this will only cause confusion. Keeping structure and aesthetics the same creates smooth transitions during navigation.

3. Choice of Colors

Color is one of the most import aspects of the UI. When developing a color theme for your app, choose hues that do not exert visual strain on users. For example, grey text on a yellow background would be difficult to read.

The number of colors matters too. Best practice is to keep it at a maximum of three. Finally, go for colors that evoke the right emotions and encourage users to follow through on your call to action (CTA).

4. Get Rid of Superfluous Functionality

Mobile app use usually follows the Paretto Principle — 80 percent of users will make use of just 20 percent of an application’s features. The more the features, the greater the risk of having a cluttered chaotic UI. So as you design the app, rank the features by order of priority and see which of the low priority features are expendable.

If it’s difficult to do this prioritization during the design phase, you may have to do it either through prototype tests or after the app goes live. Simply monitoring data usage and the number of times users call on each feature can give you a fairly accurate picture of what functions you can let go of.

5. Conventional Smartphone User Habits

Most smartphone users operate their devices with just one hand. Your mobile app interface should factor conventional gestures into the design. Users are already accustomed to sliding or touching their screens in a certain way.

There’s heavy dependence on the thumb in particular. Ergo, the placement of buttons, tabs, links and form fields should be within easy reach of the user’s thumb.

6. Good Error Handling

Despite the amount of time, thought, resource and effort you devote to building an app, there’s no guarantee that it will be error free. You have to develop a process for error handling that doesn’t leave the user bewildered.

When an error occurs, keep messages brief, simple and specific. You could also notify the user on what they need to do to resolve the error (for example, restart the app or download a newer version). Making sure the back end works as it should is something you must pay attention to as well. For instance, you can benefit from AWS monitoring for your cloud servers.

Don’t leave UI considerations up to the last minute. It should be an integral part of your software development process from the get-go. The UI can make the difference between the success and failure of your app.

The post 6 Ways to Perfect the UI of Your Mobile App appeared first on The Crazy Programmer.



CMSmap – An Open Source CMS Scanner

Cmsmap is a python based CMS scanner for automating the process of vulnerability assessment in most popular CMS’s. It can

CMSmap – An Open Source CMS Scanner on Latest Hacking News.



Saturday, 22 December 2018

Friday, 21 December 2018

SPARE: Five tips for a safer online shopping experience

There is still some time left to pick up some last-minute shopping before it’s too late but in the rush to do so don’t forget to do it safely

The post SPARE: Five tips for a safer online shopping experience appeared first on WeLiveSecurity



Google’s policy change reduces security, privacy and safety for 75% of users of ESET’s Android anti-theft service

The unfortunate implications of a well-intentioned change to Google Play Developer policies – and the negative impact it has on ESET’s Android app customers

The post Google’s policy change reduces security, privacy and safety for 75% of users of ESET’s Android anti-theft service appeared first on WeLiveSecurity



Latest Hacking News Podcast #189 – Interview with Nadir Izrael and Michael Parker of Armis

Interview with Nadir Izreal and Michael Parker of Armis on their discovery of the BLEEDINGBIT vulnerabilities.

Latest Hacking News Podcast #189 – Interview with Nadir Izrael and Michael Parker of Armis on Latest Hacking News.



FBI Seizes 15 DDoS-For-Hire Websites, 3 Operators Charged

The FBI just saved the Christmas. The U.S. Justice Department announced earlier today that the FBI has seized domains of 15 "DDoS-for-hire" websites and charged three individuals running some of these services. DDoS-for-hire, or "Booter" or "Stresser," services rent out access to a network of infected devices, which then can be used by anyone, even the least tech-savvy individual, to launch


Thursday, 20 December 2018

US Indicts Two Chinese Government Hackers Over Global Hacking Campaign

The US Department of Justice on Thursday charged two Chinese hackers associated with the Chinese government for hacking numerous companies and government agencies in a dozen countries. The Chinese nationals, Zhu Hua (known online as Afwar, CVNX, Alayos and Godkiller) and Zhang Shilong (known online as Baobeilong, Zhang Jianguo and Atreexp), are believed to be members of a state-sponsored


Hackers Exploit Malware Attacks Through Twitter Memes

When it is about memes, people usually download them right away on their devices to share further. Posting memes on

Hackers Exploit Malware Attacks Through Twitter Memes on Latest Hacking News.



Common Problems New Computer Programmers May Experience

Hacker Discloses New Unpatched Windows Zero-Day Exploit On Twitter

A security researcher with Twitter alias SandboxEscaper today released proof-of-concept (PoC) exploit for a new zero-day vulnerability affecting Microsoft's Windows operating system. SandboxEscaper is the same researcher who previously publicly dropped exploits for two Windows zero-day vulnerabilities, leaving all Windows users vulnerable to the hackers until Microsoft patched them. The


Microsoft issues emergency fix for Internet Explorer zero-day

Details are sparse about a security hole that Microsoft said is being exploited in targeted attacks

The post Microsoft issues emergency fix for Internet Explorer zero-day appeared first on WeLiveSecurity



Brosec – An Open Source Interactive Tool to Utilize Payloads and Commands

Brosec is an open source terminal based tool to help all the security professionals generate the right payloads and commands.

Brosec – An Open Source Interactive Tool to Utilize Payloads and Commands on Latest Hacking News.



Holiday online shopping special tips

Some useful advice for staying safe while hunting for bargains in this holiday season

The post Holiday online shopping special tips appeared first on WeLiveSecurity



NASA Confirmed Data Breach After an Internal Server Was Hacked

Continuing the trail of data breaches, now NASA joins the list. NASA confirmed the data breach to its employees since

NASA Confirmed Data Breach After an Internal Server Was Hacked on Latest Hacking News.



Wednesday, 19 December 2018

Microsoft Issues Emergency Patch For Under-Attack IE Zero Day

Microsoft today issued an out-of-band security update to patch a critical zero-day vulnerability in Internet Explorer (IE) Web browser that attackers are already exploiting in the wild to hack into Windows computers. Discovered by security researcher Clement Lecigne of Google's Threat Analysis Group, the vulnerability, tracked as CVE-2018-8653, is a remote code execution (RCE) flaw in the IE


Latest Hacking News Podcast #188

Microsoft issues emergency patch for Internet Explorer, attack campaign uses tried-and-true tricks, and Click2Gov breaches continue despite patch on episode

Latest Hacking News Podcast #188 on Latest Hacking News.



Visual Composer: The Brain-Twisting Story of the Name Change

If you have been a Visual Composer user for some time, you have witnessed some changes happening that might have been a little bit confusing.

The post Visual Composer: The Brain-Twisting Story of the Name Change appeared first on SitePoint.



Twitter Suspects China & Saudi Arabia Over Recent Hack

Twitter has recently reported a suspected State-sponsored attack through its contact form, possibly connected with Saudi Arabia and China. Although

Twitter Suspects China & Saudi Arabia Over Recent Hack on Latest Hacking News.



NASA fears hackers may have stolen employee data

A probe launched immediately after the discovery of the suspected incident has yet to establish the scale of the potential damage

The post NASA fears hackers may have stolen employee data appeared first on WeLiveSecurity



Mayday! NASA Warns Employees of Personal Information Breach

Another day, another data breach. This time it's the United States National Aeronautics and Space Administration (NASA) NASA today confirmed a data breach that may have compromised personal information of some of its current and former employees after at least one of the agency's servers was hacked. In an internal memo sent to all employees on Tuesday, NASA said the unknown hackers managed


Tuesday, 18 December 2018

Latest Hacking News Podcast #187

NASA reveals a data breach that compromised staff social security numbers and Trend Micro warns that HolaVPN is unsafe on episode 187 of our daily cybersecurity podcast.

Latest Hacking News Podcast #187 on Latest Hacking News.



Android RSS Reader Tutorial

Target targeted: Five years on from a breach that shook the cybersecurity industry

In December 2013 news broke that Target suffered a breach that forced consumers and the cybersecurity community to question the security practices of retailers

The post Target targeted: Five years on from a breach that shook the cybersecurity industry appeared first on WeLiveSecurity



No Proof Against Huawei Says BSI Chief

In a recent disclosure, Arne Schoenbohm, who heads Germany’s Federal Office of Information Security (BSI), made an alarming revelation.  According

No Proof Against Huawei Says BSI Chief on Latest Hacking News.



Cybersecurity Trends 2019: Privacy and intrusion in the global village

With just days left in 2018, ESET experts offer their reflections in ‘Cybersecurity Trends 2019’ on themes that are set to figure prominently in the upcoming year

The post Cybersecurity Trends 2019: Privacy and intrusion in the global village appeared first on WeLiveSecurity



Twitter Discloses Suspected State-Sponsored Attack After Minor Data Breach

Twitter has been hit with a minor data breach incident that the social networking site believes linked to a suspected state-sponsored attack. In a blog post published on Monday, Twitter revealed that while investigating a vulnerability affecting one of its support forms, the company discovered evidence of the bug being misused to access and steal users’ exposed information. The impacted


New Malware Takes Commands From Memes Posted On Twitter

Security researchers have discovered yet another example of how cybercriminals disguise their malware activities as regular traffic by using legitimate cloud-based services. Trend Micro researchers have uncovered a new piece of malware that retrieves commands from memes posted on a Twitter account controlled by the attackers. Most malware relies on communication with their


Monday, 17 December 2018

Latest Hacking News Podcast #186

New malware pulls commands from memes on Twitter, yet another Twitter bug, and Signal can't comply with new Australian encryption law on episode 186 of our daily cybersecurity podcast.

Latest Hacking News Podcast #186 on Latest Hacking News.



The most popular passwords of 2018 revealed. Are you using them?

Beyond the usual suspects among the worst of passwords, a handful of notable – but similarly poor – choices make their debuts

The post The most popular passwords of 2018 revealed. Are you using them? appeared first on WeLiveSecurity



Latest Hacking News Podcast #185

Yet more user data leaks via third-party apps from both Twitter and Facebook plus updates on the bomb threat extortion campaign on episode 185 of our daily cybersecurity podcast.

Latest Hacking News Podcast #185 on Latest Hacking News.



Sunday, 16 December 2018

5 Best Programming Languages for Kids

The rate at which children handle gadgets in this technology savvy era is quite interesting. The fact they are able to easily operate the gadgets, run programs on it easily shows that they are intrigued by it. We all at a point have come across children who not only enjoy the games or other softwares but have shown interest in asking questions on how the softwares are programmed. One of the best ways of keeping them fascinated is by teaching them programming languages, i.e., coding or by making them write a mini research paper to spur their interest in coding

5 Best Programming Languages for Kids

Image Source

Computer software, applications and websites applications are developed by using programming language commonly referred to as ‘coding’. Coding is basically the process of giving instructions to our computer to act in certain ways or perform certain tasks. Coding is important for children because it allows them to develop different skills such as problem-solving skill(the breaking down of instructions to the lowest opens up their analytical and logical mind), it also increases their creativity (by opening up their imaginative mind, allows them to creatively improve on other apps they find lacking in a particular aspect, allows them to even create their own app to solve a problem), allows them intelligently have fun rather than wasting time on irrelevances and besides coding is the new cool lucrative means of income.

When it comes to technology, everything is codes and programming. Imagine if you searched for “who can write my research paper for me” on the internet, what gives you your desired result is a function of coding. There are a lot of programming languages that children can learn how to code from at the basic and intermediate level.

5 Best Programming Languages for Kids

5 Best Programming Languages for Kids

Image Source

1. Scratch

Scratch is a programming language built by MIT’s Lifelong Kindergarten Lab.  Scratch is a free programming language that can be used without an online connection for kids who are mostly interested in animations, games, music or arts. It has an interactive online community where kids can connect with other kids and share their developed applications.  It uses a building-block visual interface.

Scratch has an interactive and user-friendly interface that naturally attracts children. It also allows a child to freely express his or her creativity to design games or animations from scratch as the name implies. Scratch is suggested for kids within the age bracket of 6-15 years of age.  It has a tutorial guide for beginners.

2. Python

Python is regarded as the easiest of programming languages to learn.  This is partly because of its basic composition and attention on whitespace. It is said to be named after the comedy series Monthly Python. It is recommended for all age brackets. It is the first stepping stone to increase your child’s interest in coding.  To show its usefulness, even Google and Disney make use of it. With python, coding can be used to create video games, numeric computing tasks, web fireworks, etc.

Python delivers like regular language. It rarely requires the use of comments because it functions with Basic English language. Python programming language also has a section for its library where it allows children to further code beyond the basic.

Python teaches children the patience and analytical skill to overcome complexities which would come from one of their strengths later in life.

3. Ruby

Ruby has the most decipherable composition for beginners. Ruby is expressive, intuitive, simple and powerful. Ruby teaches the child to freely express his or herself because it allows them to choose from different methods to solve a problem. Ruby uses blocks and first-class objects. Ruby also has a standard library and an interactive shell. Ruby is concise, well documented (extensive API docs) has an easy to understand the language that does not require extra explanations. With Ruby, the kid gets familiar with programming concepts like variables, loops, object-oriented programming, etc.

4. Lua

Lua is a free, powerful, fast and user-friendly programming language that is easily understood by kids. Lua is popularly used as a scripting language platform by game developers Because of its speed and lightness. Lua is perfect for children who are into game developing at any stage including animations. Lua engages its user by introducing simple concepts while retaining its legibility, clarity, and productivity.  Lua also removes the syntax problem that makes coding difficult for kids.

5. Blockly

Blockly is a visual block programming language built on other existing programming languages to help children become experts at coding. Blockly is essentially developed for kids 8 years and above who are learning how to code within the confines of their homes or at school.

Blokly has a “JavaScript library ” feature, a  specific UI bearing a resemblance to multi-colored and multi-shaped blocks holding and a toolbox holding the block and bin to write codes in. In operating Blockly, kids remove the blocks from the toolbox one by one and arrange them structurally until the quest is solved. Upon completion, Blockly runs a check up to assess the coding done to check for its errors.

Author Bio

Emma Rundle is a seasoned writer with a wealth of experience in technical writing. She has written as a guest writer for a number of blogs and media channels. Emma also has a bit of experience in coding and programming and ethical hacking which she sometimes does as a hobby.

Comment down below if you know about other best programming languages for kids.

The post 5 Best Programming Languages for Kids appeared first on The Crazy Programmer.



Logitech Options App Vulnerability Could Allow Keystroke Injection Attacks

Logitech has recently released a rushed update to its Options app. The company didn’t reveal explicitly what the bug fixes,

Logitech Options App Vulnerability Could Allow Keystroke Injection Attacks on Latest Hacking News.



Researcher Found Samsung User Accounts Vulnerable To CSRF Attacks

A researcher discovered a vulnerability that made it easier to hack Samsung user accounts. Allegedly, three cross-site request forgery (CSRF)

Researcher Found Samsung User Accounts Vulnerable To CSRF Attacks on Latest Hacking News.



Seven WordPress Vulnerabilities Fixed In Version 5.0.1

Earlier this month, WordPress officials rolled out WP version 5.0 with various feature upgrades. However, it also brought with it

Seven WordPress Vulnerabilities Fixed In Version 5.0.1 on Latest Hacking News.



Another Facebook Bug Exposed Private Photos Of 6.8M Users

Facebook troubles and the resultant chaos have now become so frequent that it won’t be wrong to consider them a

Another Facebook Bug Exposed Private Photos Of 6.8M Users on Latest Hacking News.



Friday, 14 December 2018

Critical SQLite Flaw Leaves Millions of Apps Vulnerable to Hackers

Cybersecurity researchers have discovered a critical vulnerability in widely used SQLite database software that exposes billions of deployments to hackers. Dubbed as 'Magellan' by Tencent's Blade security team, the newly discovered SQLite flaw could allow remote attackers to execute arbitrary or malicious code on affected devices, leak program memory or crash applications. SQLite is a


Innovative Tools You Should Consider for Your Business

We’re living in a golden age of innovation. Every day, more and more products are introduced to the market that can help streamline and improve your business’ workflow. The internet is loaded with resources that can help you and your team communicate better, share information with each other, and improve your visibility with prospective clients.

However, the sheer size of the internet can make it difficult to weed out good products from the bad. Companies are fighting for the attention of consumers, and often it’s the loudest and most bold advertising scheme that grabs people’s attention—but when has the loudest ever equated with the best?

Innovative Tools You Should Consider for Your Business 1

Despite all the white noise, there are certain products and programs that stand out. Smart businesses have discovered them, and they use them to boost their productivity, drive their operations, and improve their performance.

Upwork

Even though many businesses retain salaried staff, there are always occasional projects that require skills that aren’t possessed by internal employees. In these cases, it’s common for businesses to turn to freelancers. However, vetting freelancers can be tricky. They arrive from word-of-mouth sources, or are found on websites like Craiglist with suspect resumes.

Upwork removes all of these sketchy variables from the freelance hiring process. Their workers are heavily vetted, and their reference system ensures that potential hires are credible, proven, and capable.

Quora

Sometimes no one around the office can answer a technical question, or you and your team are struggling to plan your business’ next step. In these cases, Quora—a crowd sourced Q&A forum—can often provide you with answers. People who sign up and use Quora to both answer and ask questions are vetted in ways that other crowd sourced forums haven’t been in the past. It’s a great place to ask questions about the latest cloud storage hard drive, or how other businesses have dealt with personnel issues.

Slack

Gone are the days when teams need to physically seek each other out for every little question that they might have about a project. If someone in the office needs to send a large batch of files, or to ask a quick question, Slack provides a condensed and closed-off space only accessible by members of your business.

Slack is used by businesses of all sizes, and in many workspaces it’s become mandatory. It can streamline projects, help organize teams and information, while at the same time guaranteeing a level of security that prevents outsiders from accessing your business information.

Innovative Tools You Should Consider for Your Business 2

Squarespace

Even in the internet age when face-to-face interaction has been drastically reduced, first impressions are still important. With so much content on the internet, having a sleek website can help your company stand out from the rest. Enter Squarespace.

Squarespace is a website builder that is easy to use and offers premade templates that will fit any business. Their websites are elegant, minimal, and very easy to manage. If you ever have trouble on the backend, a dedicated support team is there to clear up questions that you may have and to help with any and all development issues. Squarespace is the full package, and should be the first step for any company who wants to present themselves online in a respectable way.

Things

If you’re tired of losing track of information or you’re having difficulty digging up files that you need to transfer, Things offers a streamlined personal task management system that is award-winning and increasingly popular among companies. It helps you manage all of the tasks that might otherwise overwhelm a busy company, and keep everything organized so that employees can easily refer to their designated assignments.

Not only is Things incredibly useful, it’s also easy to use. Other task managers get bogged down by poorly designed user interfaces and an overwhelming number of options, but Things was built with a sleek design that was intended to make navigation simple.

No matter the size of your business or how successful it might be, there’s always room for improvement. It’s worth investing in tools that can take your productivity to the next level. Beginning with the products on this list, you can get your efficiency soaring and will have clients knocking on your door in no time.

The post Innovative Tools You Should Consider for Your Business appeared first on The Crazy Programmer.



New Facebook Bug Exposed 6.8 Million Users Photos to Third-Party Apps

Facebook's latest screw-up — a programming bug in Facebook website accidentally gave 1,500 third-party apps access to the unposted Facebook photos of as many as 6.8 million users. Facebook today quietly announced that it discovered a new API bug in its photo-sharing system that let 876 developers access users' private photos which they never shared on their timeline, including images uploaded to


Huawei CFO Granted Bail. China Threatens US and Canada of Dire Consequences

The Huwaei CFO has pleaded innocent, following which she has been granted bail. However, Meng Wanzhou would be required to

Huawei CFO Granted Bail. China Threatens US and Canada of Dire Consequences on Latest Hacking News.



New Shamoon Malware Variant Targets Italian Oil and Gas Company

Shamoon is back… one of the most destructive malware families that caused damage to Saudi Arabia's largest oil producer in 2012 and this time it has targeted energy sector organizations primarily operating in the Middle East. Earlier this week, Italian oil drilling company Saipem was attacked and sensitive files on about 10 percent of its servers were destroyed, mainly in the Middle East,


Fake Bomb Threat Emails Demanding Bitcoins Sparked Chaos Across US, Canada

"Pay $20,000 worth of bitcoin, or a bomb will detonate in your building" A massive number of businesses, schools, government offices and individuals across the US, New Zealand and Canada on Thursday received bomb threats via emails that caused nationwide chaos, forcing widespread evacuations and police response. The bomb threat emails were apparently sent by spammers, threatening people that


Microsoft December Patch Tuesday Addresses Nine Critical Vulnerabilities Including A Zero-Day

This week, Microsoft has rolled out the last scheduled updates for this year. Nonetheless, it again has released a fix

Microsoft December Patch Tuesday Addresses Nine Critical Vulnerabilities Including A Zero-Day on Latest Hacking News.



How to protect yourself as the threat of scam apps grows

As the threat of bogus apps continues, what can we do to protect ourselves against these fraudulent practices?

The post How to protect yourself as the threat of scam apps grows appeared first on WeLiveSecurity



Week in security with Tony Anscombe

Android Trojan steals money from PayPal accounts, the next generation of Dark Markets, and the Google+ to shut down earlier after new bug

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity



Thursday, 13 December 2018

Latest Hacking News Podcast #184

Bomb threat email scam alarms businesses, Wordpress bug led to some passwords indexed by Google, and data protection lacking in US Border data searches on episode 183 of our daily cybersecurity podcast.

Latest Hacking News Podcast #184 on Latest Hacking News.



Malaysian government targeted with mash-up espionage toolkit

An interview with ESET researchers Tomáš Gardoň and Filip Kafka on their research of a malware toolkit used in espionage against the Malaysian government

The post Malaysian government targeted with mash-up espionage toolkit appeared first on WeLiveSecurity



British Teenager gets 3 year sentence for DDoS and False Bomb Threats

Recently, the Luton Crown Court sentenced a British teenager for sending out false bomb threats and carrying out DDoS attacks.

British Teenager gets 3 year sentence for DDoS and False Bomb Threats on Latest Hacking News.



Google+ Shut Down Date Dragged Earlier Due to Another Massive Breach

A couple of months ago, Google announced they will sunset their product Google Plus. The reasons behind this harsh decision

Google+ Shut Down Date Dragged Earlier Due to Another Massive Breach on Latest Hacking News.



Joomscan – Open Source Joomla Vulnerability Scanner

Joomscan is a scanner by OWASP, which aims to automate the task for vulnerability assessments for Joomla based sites. Based

Joomscan – Open Source Joomla Vulnerability Scanner on Latest Hacking News.



Microsoft urges for Legal Framework to govern Facial recognition

Microsoft has reportedly sought for a reasonable legal framework for the deployment and use of facial recognition technology. While this

Microsoft urges for Legal Framework to govern Facial recognition on Latest Hacking News.



Latest Hacking News Podcast #183

Operation Sharpshooter targeting nuclear, defense, and energy companies, Super Micro release findings of its investigation into alleged hardware hack, and Grammarly announced public bug bounty.

Latest Hacking News Podcast #183 on Latest Hacking News.



Wednesday, 12 December 2018

PrivilegeEsc-Linux – Open Source Script for Enumeration on Linux

PrivilegeEsc-Linux is a simple script which checks the security on a Linux machine. It can run many different options, such

PrivilegeEsc-Linux – Open Source Script for Enumeration on Linux on Latest Hacking News.



Encrypted Messaging Apps Vulnerable To Side-Channel Attacks Including WhatsApp, Telegram, and Signal!

WhatsApp, Signal, and Telegram have all been around for a while. Though a lot of instant messaging apps were already

Encrypted Messaging Apps Vulnerable To Side-Channel Attacks Including WhatsApp, Telegram, and Signal! on Latest Hacking News.



Adobe's Year-End Update Patches 87 Flaws in Acrobat Software

Adobe is closing out this year with its December Patch Tuesday update to address a massive number of security vulnerabilities for just its two PDF apps—more than double the number of what Microsoft patched this month for its several products. Adobe today released patches for 87 vulnerabilities affecting its Acrobat and Reader software products for both macOS and Windows operating systems, of