Translate

Sunday, 31 May 2020

Microsoft Warns Of PonyFinal Ransomware Attacks Active In The Wild

Microsoft alerted all its users to stay vigilant with regard to PonyFinal ransomware attacks. Since the ransomware attacks are active

Microsoft Warns Of PonyFinal Ransomware Attacks Active In The Wild on Latest Hacking News.



VivaVideo And Other Apps With Over 157 Million Installs Spy On Users

While many people love to use video editing apps, little do they realize that not all of these apps are

VivaVideo And Other Apps With Over 157 Million Installs Spy On Users on Latest Hacking News.



StrandHogg 2.0 Vulnerability Targets Android Devices To Steal Data

Last year, Android devices suffered cyber attacks after attackers exploited the StrandHogg vulnerability to steal banking data. Now, after a

StrandHogg 2.0 Vulnerability Targets Android Devices To Steal Data on Latest Hacking News.



Researcher Discovers Critical Vulnerability and Was Awarded $100,000

Heads up Apple users! A researcher found a vulnerability that allowed for an attacker to hack accounts simply via email.

Researcher Discovers Critical Vulnerability and Was Awarded $100,000 on Latest Hacking News.



Saturday, 30 May 2020

Critical 'Sign in with Apple' Bug Could Have Let Attackers Hijack Anyone's Account

Apple recently paid Indian vulnerability researcher Bhavuk Jain a huge $100,000 bug bounty for reporting a highly critical vulnerability affecting its 'Sign in with Apple' system. The now-patched vulnerability could have allowed remote attackers to bypass authentication and take over targeted users' accounts on third-party services and apps that have been registered using 'Sign in with Apple'

New Noise-Resilient Attack On Intel and AMD CPUs Makes Flush-based Attacks Effective

Modern Intel and AMD processors are susceptible to a new form of side-channel attack that makes flush-based cache attacks resilient to system noise, newly published research shared with The Hacker News has revealed. The findings are from a paper "DABANGG: Time for Fearless Flush based Cache Attacks" published by a pair of researchers, Biswabandan Panda and Anish Saxena, from the Indian

Exclusive – Any Mitron (Viral TikTok Clone) Profile Can Be Hacked in Seconds

Mitron (means "friends" in Hindi), you have been fooled again! Mitron is not really a 'Made in India' product, and the viral app contains a highly critical, unpatched vulnerability that could allow anyone to hack into any user account without requiring interaction from the targeted users or their passwords. I am sure many of you already know what TikTok is, and those still unaware, it's a

Friday, 29 May 2020

Solve SyntaxError: EOL while scanning string literal in Python

Hello friends, In my last post I’ve discussed the common problem Python Programmers face i.e. unexpected EOF while parsing and in today’s post, I’ll be discussing EOL while scanning string literal.

But do you exactly know what is this error all about and how we can remove it from our python code?

So, what exactly an EOL is?

EOL stands for End Of Line. This means we have now come to the end of our line and the error related to this is shown below with example code.

def printName():
    return "This is a test basestring
    
printName()

Now, after running this piece of code, I get an error something similar to this.

File "main.py", line 2
  return "This is a test basestring


SyntaxError: EOL while scanning string literal


...Program finished with exit code 1
Press ENTER to exit the console

end of line error

Now the above code contains one error and the error is that the return in the printName( ) function in the above code is not closed properly. We can see that it doesn’t have the closing quote ".

Now, when we tried to run this code, it showed us SyntaxError: EOL while scanning string literal.

Now the problem is our return keyword has some syntax error. This lead to the SyntaxError: EOL while scanning string literal. To overcome this type of error in our python file, we need to ensure that we have not left any part of our string unclosed or not in proper syntax. I hope this is clear to you.

Sometimes we try to print our string to multiple lines also and in that case what happens is that, let’s see this with an example:

def multiLine():
    return "This is a new line
                              and this is the next line"
multiLine()

Now, when we will try to run this code, it will give us the same error which we got above,

eol multi line

To overcome this type of error while using the string spreading into multiple line, we can use the ''' or """. We can wrap our code into the triple quote. Both quotes single and double quote will work fine.

eol error multiline solution

Here you can see that our code is working fine and we are good to go.

Well, this was all about the EOL and the error related to it. If you stuck into any kind of error, don’t forget to google it and try to debug it on your own. This will teach you how to debug on your own as someone might have faced a similar problem earlier.

If you still don’t find any solution for your problem, you can ask your doubt in the comment’s section below and we’ll get back to you🤓.

Thanks for your visit and if you are new here, consider subscribing to our newsletter. See you in my next post. Bye!

The post Solve SyntaxError: EOL while scanning string literal in Python appeared first on The Crazy Programmer.



Week in security with Tony Anscombe

New ESET research into Turla's malicious toolkit – GDPR turns two – Critical flaw in Android devices

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity



Thursday, 28 May 2020

People know reusing passwords is risky – then do it anyway

And most people don’t change their password even after hearing about a breach, a survey finds

The post People know reusing passwords is risky – then do it anyway appeared first on WeLiveSecurity



A New Free Monitoring Tool to Measure Your Dark Web Exposure

Last week, application security company ImmuniWeb released a new free tool to monitor and measure an organization's exposure on the Dark Web. To improve the decision-making process for cybersecurity professionals, the free tool crawls Dark Web marketplaces, hacking forums, and Surface Web resources such as Pastebin or GitHub to provide you with a classified schema of your data being offered

Researchers Uncover Brazilian Hacktivist's Identity Who Defaced Over 4800 Sites

It's one thing for hackers to target websites and proudly announce it on social media platforms for all to see. It's, however, an entirely different thing to leave a digital trail that leads cybersecurity researchers right to their doorsteps. That's exactly what happened in the case of a hacktivist under the name of VandaTheGod, who has been attributed to a series of attacks on government

Wednesday, 27 May 2020

Critical Android flaw lets attackers hijack almost any app, steal data

Left unpatched, the vulnerability could expose almost all Android users to the risk of having their personal data intercepted by attackers

The post Critical Android flaw lets attackers hijack almost any app, steal data appeared first on WeLiveSecurity



4 Most High-Demand Skillsets for Remote Jobs

4 Most In-demand Skill Sets for Remote Jobs

Working remotely is on the rise, and will continue to do so long after COVID-19 runs its course. If you’re thinking about ditching the office but aren’t sure how, learning one (or more!) of the following skillsets will increase your chances of landing a remote job.

Software Development

Software development is the most in-demand remote job in the world. And with a median salary of $66,000/year, you can probably afford a decent home office setup in which to operate.

Software development might be the job for you if you like solving problems, building things, and continuous learning. Even the best developers have to jump on GitHub or Stack Overflow from time to time to crowdsource a solution. In fact, development practically necessitates collaboration, making the development community extremely tight and incredibly helpful.

So what skills does a remote software developer need in 2020? Well, a lot of them. Google “software development skills” and you’ll find list upon list of subjects like programming languages, algorithms, databases, and encryption. But good news (and, as you’ll find, a running theme in this article): you don’t have to learn everything.

Instead, choose a software development concentration. For example, going from software development to Java development immediately cuts your required skill set in half. And you don’t have to stop there. Refining your concentration to mobile Java development, or even mobile game Java development, turns a near Herculean task into something much more reasonable.

Digital Marketing

Digital marketing is another wildly in-demand skill set. Digital marketers are responsible for services like social media campaign planning, content coordination, SEO, and PPC ads. Remote digital marketing jobs average a median salary of $50,500/year, and nearly every industry is hiring.

Continue reading 4 Most High-Demand Skillsets for Remote Jobs on SitePoint.



Chinese Researchers Disrupt Malware Attack That Infected Thousands of PCs

Chinese security firm Qihoo 360 Netlab said it partnered with tech giant Baidu to disrupt a malware botnet infecting over hundreds of thousands of systems. The botnet was traced back to a group it calls ShuangQiang (also called Double Gun), which has been behind several attacks since 2017 aimed at compromising Windows computers with MBR and VBR bootkits, and installing malicious drivers for

Samsung Introduces New SE Chip With 6+ Certification Secure Device

Samsung has announced a new step toward ensuring secure devices. Reportedly, Samsung has developed a new SE chip security solution

Samsung Introduces New SE Chip With 6+ Certification Secure Device on Latest Hacking News.



Tuesday, 26 May 2020

Crooks threaten to leak customer data stolen from e‑commerce sites

A hack-and-extort campaign takes aim at poorly secured databases replete with customer information that can be exploited for further attacks

The post Crooks threaten to leak customer data stolen from e‑commerce sites appeared first on WeLiveSecurity



From Agent.BTZ to ComRAT v4: A ten‑year journey

Turla has updated its ComRAT backdoor and now uses the Gmail web interface for Command and Control

The post From Agent.BTZ to ComRAT v4: A ten‑year journey appeared first on WeLiveSecurity



Spectra Attack Target Separation Between Wireless Communication Chips For Coordinated Attacks

While the tech giants were busy managing vulnerabilities in Bluetooth and WiFi chips, researchers have found another serious issue. Reportedly,

Spectra Attack Target Separation Between Wireless Communication Chips For Coordinated Attacks on Latest Hacking News.



NordVPN Just Released NordLynx VPN Protocol And It’s Really Fast!

Nowadays, more and more people are becoming increasingly familiar with the importance of online privacy. As a result, more people

NordVPN Just Released NordLynx VPN Protocol And It’s Really Fast! on Latest Hacking News.



The History of Hacking from Phreaking to Cryptocurrencies

As long as there have been locks, there have been lockpicks to break into them. Steve Jobs and Woz used

The History of Hacking from Phreaking to Cryptocurrencies on Latest Hacking News.



5 Reasons to Use a VPN in a Net Neutrality-Free World

In December of 2017, the FCC voted to repeal net neutrality. What this means is that the internet is now

5 Reasons to Use a VPN in a Net Neutrality-Free World on Latest Hacking News.



Everything You Need to Know About Managed IT Services

If your company is not keeping pace with technological changes or your IT team is too small to cope with

Everything You Need to Know About Managed IT Services on Latest Hacking News.



Signal Hints About Ditching Phone Numbers As User ID As It Introduces Signal PINs

Taking another step towards users’ privacy with ease, Signal has now announced a new feature. As revealed, Signal has introduced

Signal Hints About Ditching Phone Numbers As User ID As It Introduces Signal PINs on Latest Hacking News.



The Pros and Cons of T2 Chip and A Great Breakthrough in T2 Chip Data Recovery

If you own or are going to own a latest Mac computer, this article can give you useful information that

The Pros and Cons of T2 Chip and A Great Breakthrough in T2 Chip Data Recovery on Latest Hacking News.



New Unc0ver iOS Jailbreak Works For All Latest iOS Versions Due To Zero-Day Bug

Here’s some good news for all iPhone users (and bad news for Apple perhaps). A new jailbreak Unc0ver is out

New Unc0ver iOS Jailbreak Works For All Latest iOS Versions Due To Zero-Day Bug on Latest Hacking News.



New Android Flaw Affecting Over 1 Billion Phones Let Attackers Hijack Apps

Remember Strandhogg? A security vulnerability affecting Android that malicious apps can exploit to masquerade as any other app installed on a targeted device to display fake interfaces to the users, tricking them into giving away sensitive information. Late last year, at the time of its public disclosure, researchers also confirmed that some attackers were already exploiting the flaw in the

New ComRAT Malware Uses Gmail to Receive Commands and Exfiltrate Data

Cybersecurity researchers today uncovered a new advanced version of ComRAT backdoor, one of the earliest known backdoors used by the Turla APT group, that leverages Gmail's web interface to covertly receive commands and exfiltrate sensitive data. "ComRAT v4 was first seen in 2017 and known still to be in use as recently as January 2020," cybersecurity firm ESET said in a report shared with

Monday, 25 May 2020

Two years later, has GDPR fulfilled its promise?

Has the landmark law helped build a culture of privacy in organizations and have consumers become more wary of sharing their personal data?

The post Two years later, has GDPR fulfilled its promise? appeared first on WeLiveSecurity



New Tool Can Jailbreak Any iPhone and iPad Using An Unpatched 0-Day Bug

The hacking team behind the "unc0ver" jailbreaking tool has released a new version of the software that can unlock every single iPhone, including those running the latest iOS 13.5 version. Calling it the first zero-day jailbreak to be released since iOS 8, unc0ver's lead developer Pwn20wnd said "every other jailbreak released since iOS 9 used 1day exploits that were either patched in the next

Sunday, 24 May 2020

Solve IndexError: list index out of range in Python

Hello readers, welcome back to a yet another post of The Crazy Programmer. Today I’ll be discussing one of the common error programmers make when they start with programming and that is IndexError. Now before talking about this error, let’s try to see what an Index is and why this error occurs.

An index is a location of an item in an Array or a List and in most of the programming language, it starts from 0. So when we count the elements in a list, we’ll count them from 1 but when we’ll try to access the elements of the list, we’ll start our index from 0. Let us understand this with an example. Please don’t skip the comments.

color = ['red', 'green', 'blue', 'black', 'white']
# index    0       1        2       3        4

# here we can see that we have 5 colors in our color list
# but when we'll try to print these items from our list
# we can't get color[1] as red
# this is because we may find red to be the first element
# but technically it is not at index 1
# to print red, we need to use 0 as the index and similarly 
# for other colors, we have to use the index accordingly

print(color[0]) # 0 for red
print(color[1]) # 1 for green
print(color[2]) # 2 for blue
print(color[3]) # 3 for black
print(color[4]) # 4 for white

So we can say that green is the 2nd element of the color list but we cannot say that it is at index ‘2’. Similarly white is at 5th position but it is not at 5th index. If we’ll try to access white and if we’ll use print(color[5]) to access white, then it is going to give us an error i.e. IndexError: list index out of range.

index error

Here we all can see that I’m trying to print the value of a list at an index ‘5’ but here in the array, we don’t have any element at that index.

Now the interpreter will try to parse this code and it will not find any value at 4th index and ultimately it will fail to print the value.

So now I think it is clear why IndexError occurs and how you can avoid them. Still, if you stuck into any kind of error, don’t forget to google it and try to debug it on your own. This will teach you how to debug your code as someone might have faced a similar problem earlier.

If you still don’t find any solution for your problem, you can ask your doubt in the comment’s section below and we’ll get back to you🤓.

This was all for today. Thanks for your visit and if you are new here, consider subscribing to our newsletter. See you in my next post. Bye!

The post Solve IndexError: list index out of range in Python appeared first on The Crazy Programmer.



Friday, 22 May 2020

Week in security with Tony Anscombe

ESET research into Winnti Group's new backdoor – A dangerous Android app under the microscope – The BIAS Bluetooth bug

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity



Insidious Android malware gives up all malicious features but one to gain stealth

ESET researchers detect a new way of misusing Accessibility Service, the Achilles’ heel of Android security

The post Insidious Android malware gives up all malicious features but one to gain stealth appeared first on WeLiveSecurity



How encryption can help protect your sensitive data

Here’s how encryption can help keep your data safe from prying eyes – even if your device is stolen or your cloud account is hacked

The post How encryption can help protect your sensitive data appeared first on WeLiveSecurity



Thursday, 21 May 2020

Chrome 83 arrives with enhanced security and privacy controls

New features include DNS over HTTPS, a Safety Check section and simpler cookie management

The post Chrome 83 arrives with enhanced security and privacy controls appeared first on WeLiveSecurity



No “Game over” for the Winnti Group

The notorious APT group continues to play the video game industry with yet another backdoor

The post No “Game over” for the Winnti Group appeared first on WeLiveSecurity



WolfRAT Malware Targets Messengers Apps On Android Devices

Heads up Android users! Here is another threat targeting your devices. New malware WolfRAT has surfaced online that targets messenger

WolfRAT Malware Targets Messengers Apps On Android Devices on Latest Hacking News.



Spyse – Cybersecurity Search Engine for Quick Recon

Spyse is a relatively new service in cybersecurity, but their innovative approaches have gained the attention of many pentesters and cybersecurity specialists.

The service itself is a cybersecurity search engine which can be used for gathering mass technical data from the internet. The special thing about Spyse, is that they have one of the largest databases of its kind: hosting all the technical internet data that specialists might need for finding vulnerabilities, gathering competitor data, or just overall reconnaissance.

the data you get

Read on to learn how they collect, store, and provide the data.

How Spyse Collects Data Globally

Spyse engine performs regular data scans all over the world. This is done thanks to a global server distribution system, which not only lets them bypass area scanning restrictions and ISP blocking, but enables them to harvest much more data from their sources than you would normally get.

Server map

Their scanning infrastructure is composed of ten self-developed scanners. Each of these scanners focuses on collecting specific types of information. After the data is gathered, it gets processed by sorting algorithms and stored into the Spyse database.

Database Browsing

The database has all the data users would need for reconnaissance stored and instantly available. Not only that, but searching for data lets users see interlinked, or connected results. This makes for more browsing opportunities like gaining extra information on targets, seeing more vectors of attack, even visualizing tech-data relationships between different companies.

The database itself stores over 7 billion documents of hot data on 50 high-functioning and most reliable servers. This data contains everything: DNS records, SSL/TLS certificate data, domains and subdomains of various organizations, IP data, and much more. The biggest perk is the fact that you can access all of it instantly, without having to wait for scans.

Web Interface, API, Python

Spyse can be accessed through a web interface and an API.

The web interface looks like a familiar search engine perked for cybersecurity. Search results return in tables which can then be filtered to get a more convenient look. All found results can then be downloaded and accessed offline.

Alternatively, users can use this search engine via flexible API or integrate it with their tools and services. API has a documentation on Swagger, which makes it a pleasure to work with. It’s flexible, and can be used with many methods which are outlined on the API documentation.

Extra Productivity Tools

There are two handy features that alleviate the utility of this cybersecurity search engine.

The Advanced Search is a live filter which helps sort big chunks of data as you’re browsing through the database. Users can apply up to 5 search parameters per query to extract very specific data that can’t be received with a simple search. For example: searching for ports users can obtain all open ports with specific CVEs, define products, applications, OS, and more in relation to some company.

To get quick information about open ports users may use Spyse’s port scanner that provides instant data without waiting for long scans.

advanced search

Spyse Scoring is another powerful feature which analyzes targets for vulnerabilities. It compares all information found by spyse scanners, and shows the level of security based on the rating of 0-100. Each found vulnerability is presented with expanded details that explains its severity, vector, dates and other info.

But it significantly improves when used in combination with the Advanced Search, allowing search by CVE IDs and the vulnerability score combining it with other search parameters for fascinating results.

scoring

Whom Spyse Was Made For

Using this search engine pentesters and bug bounty hunters will always remain invisible while seeking vulnerabilities, save money and time for their own scanning infrastructure and avoid the rate limits. It can also be used when other methods are rendered unavailable by contract or bug bounty agreement.
Overall, Spyse significantly improves the quality of specialists’ work and provides some new experience solving the daily routine tasks.

The post Spyse – Cybersecurity Search Engine for Quick Recon appeared first on The Crazy Programmer.



How Cybersecurity Enables Government, Health, EduTech Cope With COVID-19

The advent of the Covid-19 pandemic and the impact on our society has resulted in many dramatic changes to how people are traveling, interacting with each other, and collaborating at work. There are several trends taking place as a consequence of the outbreak, which has only continued to heighten the need for the tightest possible cybersecurity. Tools for Collaboration There has been a

Iranian APT Group Targets Governments in Kuwait and Saudi Arabia

Today, cybersecurity researchers shed light on an Iranian cyber espionage campaign directed against critical infrastructures in Kuwait and Saudi Arabia. Bitdefender said the intelligence-gathering operations were conducted by Chafer APT (also known as APT39 or Remix Kitten), a threat actor known for its attacks on telecommunication and travel industries in the Middle East to collect personal

Wednesday, 20 May 2020

These things may be cool, but are they safe?

In the rush to embrace IoT devices, we shouldn’t trade in our privacy and security for the added convenience

The post These things may be cool, but are they safe? appeared first on WeLiveSecurity



How DDoS Attacks Are Evolving In 2020

Distributed Denial of Service (DDoS) attacks can be seemingly innocuous as they don’t usually involve a breach of data or

How DDoS Attacks Are Evolving In 2020 on Latest Hacking News.



[Guide] Finding Best Security Outsourcing Alternative for Your Organization

As cyberattacks continue to proliferate in volume and increase in sophistication, many organizations acknowledge that some part of their breach protection must be outsourced, introducing a million-dollar question of what type of service to choose form. Today, Cynet releases the Security Outsourcing Guide (download here), providing IT Security executives with clear and actionable guidance on

Review Of KeepSolid Smart DNS – A Quick Way To Bypass Georestrictions

When the world is adamant to limit your internet freedom, one thing still respects your rights – a Smart DNS.

Review Of KeepSolid Smart DNS – A Quick Way To Bypass Georestrictions on Latest Hacking News.



New DNS Vulnerability Lets Attackers Launch Large-Scale DDoS Attacks

Israeli cybersecurity researchers have disclosed details about a new flaw impacting DNS protocol that can be exploited to launch amplified, large-scale distributed denial-of-service (DDoS) attacks to takedown targeted websites. Called NXNSAttack, the flaw hinges on the DNS delegation mechanism to force DNS resolvers to generate more DNS queries to authoritative servers of attacker's choice,

Ukrainian Police Arrest Hacker Who Tried Selling Billions of Stolen Records

The Ukrainian police have arrested a hacker who made headlines in January last year by posting a massive database containing some 773 million stolen email addresses and 21 million unique plaintext passwords for sale on various underground hacking forums. In an official statement released on Tuesday, the Security Service of Ukraine (SBU) said it identified the hacker behind the pseudonym "Sanix

Is HTML a Programming Language?

When we talk about a programming language, we can say them as a medium to communicate with the computer. To express ourselves, we as humans talk with each other using any of our native languages but we cannot simply communicate with the computer the same way.

It simply can’t understand our native language. Instead, we need a translator who can translate our language into a computer’s language.

Now, before talking about the translator, I want to talk about the topic of today’s post, i.e. is HTML a programming language?

HTML is a declarative programming language. What does that mean? Well, a declarative programming language is a paradigm that only states what the result should look like and not hot to achieve it. We use basic statements for achieving something we want. Here we use constraints to describe a user interface.

User Interface

This is how we use constraints for creating a UI using HTML.

<!DOCTYPE html>
<html>
  <head>
    <title>Page Title</title>
  </head>
  <body>
    <h1>This is a Heading</h1>
    <p>This is a paragraph.</p>
  </body>
</html>

These constraints are going to describe the structure of our UI. Here the h1 is going to be a heading of our UI and the p is going to be the paragraph of our UI. The HTML parser or the HTML engine of the browser is going to render the UI from the above constraints. Here, we haven’t described how to achieve our desired UI.

Whereas in other programming languages, we have to teach a computer how to achieve a particular result. For example, if we want to make a simple calculator, we need to show the computer how to do that.

a = int(input('Enter number'))
b = int(input('Enter number'))

c = a + b

print ('Sum of a and b is: {0}'.format(c))

All these programming logic can’t be implemented using HTML and can only be achieved when we use Javascript, a type of programming language for the web.

So, how to implement the same logic using HTML and JS? Let’s see.

<!DOCTYPE html>
<html>
    <head>
        <meta http-equiv="content-type" content="text/html; charset=utf-8" />
        <title>Add two numbers</title>
    </head>
    <body>
        <input type="number" name="first_num" id="x" placeholder="Enter first number"/>
        <br />
        <input type="number" name="second_num" id="y" placeholder="Enter second number"/>
        <br />
        <button id="go">Calculate</button>
        
        <div id="result"></div>
        
        <script>
            "use strict";
            function add() {
                var x = Number(document.getElementById('x').value);
                var y = Number(document.getElementById('y').value);
            
                document.getElementById('result').innerHTML = x+y;
                return false;
            }
            
            document.getElementById('go').addEventListener('click', add);
        </script>
    </body>
</html>

This states that we can’t implement programming logic in HTML but we can achieve that using Javascript.

Now, I hope you get what I’m trying to say for HTML.

Well, this was all about today’s topic and points related to it. If you stuck into any kind of confusion, don’t forget to google it and try to solve it on your own. This will teach you how to learn on your own as someone might have faced a similar problem earlier.

Still, if you still don’t find any solution for your problem, you can ask your doubt in the comment’s section below and we’ll get back to you🤓. Till then enjoy your code. See you in my next post. Bye✌!

The post Is HTML a Programming Language? appeared first on The Crazy Programmer.



Tuesday, 19 May 2020

Bluetooth flaw exposes countless devices to BIAS attacks

As many as 30 smartphones, laptops and other devices were tested – and all were found to be vulnerable

The post Bluetooth flaw exposes countless devices to BIAS attacks appeared first on WeLiveSecurity



Brazil's Biggest Cosmetic Brand Natura Exposes Personal Details of Its Users

Brazil's biggest cosmetics company Natura accidentally left hundreds of gigabytes of its customers' personal and payment-related information publicly accessible online that could have been accessed by anyone without authentication. SafetyDetective researcher Anurag Sen last month discovered two unprotected Amazon-hosted servers—with 272GB and 1.3TB in size—belonging to Natura that consisted of

British Airline EasyJet Suffers Data Breach Exposing 9 Million Customers' Data

British low-cost airline EasyJet today admitted that the company has fallen victim to a cyber-attack, which it labeled "highly sophisticated," exposing email addresses and travel details of around 9 million of its customers. In an official statement released today, EasyJet confirmed that of the 9 million affected users, a small subset of customers, i.e., 2,208 customers, have also had their

New Bluetooth Vulnerability Exposes Billions of Devices to Hackers

Academics from École Polytechnique Fédérale de Lausanne (EPFL) disclosed a security vulnerability in Bluetooth that could potentially allow an attacker to spoof a remotely paired device, exposing over a billion of modern devices to hackers. The attacks, dubbed Bluetooth Impersonation AttackS or BIAS, concerns Bluetooth Classic, which supports Basic Rate (BR) and Enhanced Data Rate (EDR) for

Monday, 18 May 2020

Simple Strategies for Winning the Positions Other Developers Want

Simple strategies for getting positions other developers want

How do they do it?

“How is [insert developer name] able to attract the promotions and job offers they’re getting? Their work is trash; I’m a much better developer! I work twice as hard, write better code, and produce 2x more work than they do? This is completely unfair.”

You’re right, it is unfair.

This is a serious career problem, assuming that you’ve made an accurate assumption about your skills and performance. Seriously, what gives?

Why most developers optimize for the wrong goal

It’s a common mistake made by many employees in general. Here’s a quote from Reddit user Myidiotbox that encapsulates both the attitude of many employees and the response they receive in return.

Card

This is the unspoken attitude lurking beneath for many people.

“I’m working really hard so I deserve X. I did my job well so I want Y.”

Here’s the problem with this attitude.

It takes you further away from the goals you want (such as being treated well, making more money, achieving significance, and so on). This perception is the primary reason so many developers fail to achieve the career goals they aspire to.

Here are the goals (if you can call them that) a healthy employer looks for.

  • Can I count on this developer to deliver amazing work consistently?
  • Is this developer loyal or will he betray me and jump ship as soon as he gets the chance?
  • How easy is it to replace these developers?
  • Could I replace them if they left?
  • How long would it take and how much would it cost me?
  • This developer is killing it, how do I help them produce more amazing work?

See the problem?

There’s a mismatch here. The vast majority of people are struggling with Dunning-Kruger effect and are prone to overestimate their competence. They believe they’re doing a better job relative to their peers.

But they’re not.

Here’s why this is an issue. This mismatched thinking puts you at odds with your employer. This creates significant problems down the line, too, because it turns employees (you) in to mercenaries over time.

If this sounds harsh, it’s not intended to be.

Here are some simple strategies web developers can use to attract the positions other developers want with minimal effort.

Strategy #1: Become a patriot, stay a patriot

In 2013, Gallup worked with then Nationwide CEO Steve Rasmussen to improve employee engagement. In the course of their relationship, Rasmussen shared a surprising observation.

Employees are either patriots or mercenaries.

Not because they want to be but because they have to be.

Patriots totally identify with their company, and mercenaries are more likely to focus on personal outcomes.

Patriot employees are engaged. They have ownership, they believe in their firm and their firm believes in them. Instead of looking out for themselves, they’re focused on looking out for their firm.

On the other hand, mercenaries are focused on themselves. They tend to rely on serial job-hopping, power hoarding, and social climbing to get what they want. Mercenaries are focused on getting as much value as they can for themselves; they don’t care much about their company.

It’s no surprise then that they’re disengaged.

If the interests of the firm happen to align with their own interests, they’ll do what’s best for the firm. But they’re not really focused on putting their firm ahead of themselves.

Most of the time they can’t.

Why? Because their employer is a mercenary: these employers are focused on squeezing as much value as they can out of their employees. Then, they’re tossed aside once they’re burned out and used up.

You’ll want to stay a patriot.

This means you continue to buy in to your company’s vision. You continue to believe in your employer or co-workers and you look out for them. The instant you can’t do that, you start looking for another job. Here’s why it’s important to remain a patriot.

Intention has a smell.

The exceptional opportunities, benefits, and rewards go overwhelmingly to people who like, trust, and believe in you. These people can smell your intentions, partially due to the fact that humans communicate chemically.

Additionally, there’s a certain kind of tone, inflection, attention, and posture that’s communicated when we’re actually interested and engaged in something. If you’re like most humans on planet Earth, you know what that looks like. The better you are at remaining invested in your employer and co-workers — helping them solve tough problems, sticking with them through bad times — the easier it is win these coveted positions.

Continue reading Simple Strategies for Winning the Positions Other Developers Want on SitePoint.



European supercomputers hacked to mine cryptocurrency

Several high-performance computers working on COVID-19 research have been forced offline following a string of attacks

The post European supercomputers hacked to mine cryptocurrency appeared first on WeLiveSecurity



5 Privacy Risks You Might Not Know About

There’s no doubt about it, we’re surrounded by technology and submit to an awful lot of data collection in return

5 Privacy Risks You Might Not Know About on Latest Hacking News.



How to Choose a VPN for Yourself

Some of the top internet service providers offer free public Wi-Fi hotspots throughout the country. I really appreciate these hotspots

How to Choose a VPN for Yourself on Latest Hacking News.



Cyber Warfare – Today and Tomorrow

Cyber warfare is not the distant future of international wars – it’s the reality of today. Every digital tool and

Cyber Warfare – Today and Tomorrow on Latest Hacking News.



Sunday, 17 May 2020

Facebook Acquires GIPHY For $400 Million To Integrate It With Instagram

After WhatsApp and Instagram, Facebook now acquire a new company. As announced, Facebook has acquired the popular GIF-maker platform GIPHY.

Facebook Acquires GIPHY For $400 Million To Integrate It With Instagram on Latest Hacking News.



New Ramsay Malware Can Steal Data From Air-Gapped Networks

Continuing the trail of security threats to air-gapped systems, now joins a malware. Dubbed Ramsay, the malware with as much

New Ramsay Malware Can Steal Data From Air-Gapped Networks on Latest Hacking News.



Mandrake Malware Is Secretly Spying On Android Users For Several Years

While numerous Android malware kesep emerging online every now and then, this malware stayed under the radar for years. Identified

Mandrake Malware Is Secretly Spying On Android Users For Several Years on Latest Hacking News.



Pitney Bowes Suffered Second Ransomware Attack Within A Year

As the world is in a standstill and people are relying more on delivery services, the threat actors are targeting

Pitney Bowes Suffered Second Ransomware Attack Within A Year on Latest Hacking News.



Friday, 15 May 2020

Week in security with Tony Anscombe

ESET research into malware taking aim at air-gapped networks – Dissecting a backdoor hitting high-profile targets in Asia – WannaCryptor three years later

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity



Microsoft fixes vulnerability affecting all Windows versions since 1996

Another vulnerability in the same Windows component was abused by Stuxnet a decade ago

The post Microsoft fixes vulnerability affecting all Windows versions since 1996 appeared first on WeLiveSecurity



Astaroth Malware Evolves Further To Abuse YouTube Channel Descriptions

Astaroth Trojan that has been around for several years is now back with even more features. This time, Astaroth malware

Astaroth Malware Evolves Further To Abuse YouTube Channel Descriptions on Latest Hacking News.



Google WordPress Plugin Bug Allowed Attackers To Access Google Search Console

Continuing the list of plugins risking WordPress websites, now joins Site Kit by Google. This Google WordPress plugin had a

Google WordPress Plugin Bug Allowed Attackers To Access Google Search Console on Latest Hacking News.



Solve SyntaxError: unexpected EOF while parsing

How many of us are Python Programmers here? I hope many of us and I hope almost all of us might have come across SyntaxError: unexpected EOF while parsing and we might have tried to look for it somewhere online.

But do you exactly know what is this error all about and how we can remove it from our python code?

So, what exactly an EOF is?

EOF stands for End Of File. This means we have now come to the end of our file and the error related to this is shown below with example code.

Suppose I was writing a program in python and I forget to write it in proper syntax. For example:

num = [1, 2, 3, 4, 5]

# here in for loop, I tried to end the print function in a wrong way
for i in num:
    print(i

Now the above code contains one error and the error is that the print function in the above code is not closed properly. We can see that it doesn’t have the closing parenthesis print( .

Now, when we tried to run this code, it showed us SyntaxError: unexpected EOF while parsing

End Of File

Now the problem is before our print function ends, our file ended. This lead to the SyntaxError: unexpected EOF while parsing. To overcome this type of error in our python file, we need to ensure that we have not left any part of our code unclosed or not in proper syntax. I hope this is clear to you.

Well, this was all about the EOF and the error related to it. If you stuck into any kind of error, don’t forget to google it and try to debug it on your own. This will teach you how to debug on your own as someone might have faced a similar problem earlier.

If you still don’t find any solution for your problem, you can ask your doubt in the comment’s section below and we’ll get back to you🤓.

Thanks for your visit and if you are new here, consider subscribing to our newsletter. See you in my next post. Bye!

The post Solve SyntaxError: unexpected EOF while parsing appeared first on The Crazy Programmer.



HTTP Status Codes Command This Malware How to Control Hacked Systems

A new version of COMpfun remote access trojan (RAT) has been discovered in the wild that uses HTTP status codes to control compromised systems targeted in a recent campaign against diplomatic entities in Europe. The cyberespionage malware—traced to Turla APT with "medium-to-low level of confidence" based on the history of compromised victims—spread via an initial dropper that masks itself as