Thursday , March 28 2024 10:54 PM
Home / Androidpage 5

Android

Warning: 100+ Tor Nodes Designed to Spy on Hidden Services

Two researchers, Amirali Sanatinia and Guevara Noubir, from Northwestern University, carried out an experiment on the Tor Network for 72 days and discovered at least 110 malicious Tor Hidden Services Directories (HSDirs) on the network. Cory Doctorow explains: These nodes — ordinary nodes, not exit nodes — sorted through all …

Read More »

Some Security Measures to Protect Your Servers

Introduction External and internal attackers day after day are menacing your networks. Many intelligent methods are discovered in order to get access and damage your server. Currently, the Sun Java system application server can’t be as beneficial as it was previously since the tactics used by those attackers are being …

Read More »

How to Protect Your Server Against the HTTPoxy Vulnerability

What Is HTTPoxy? On July 18th, a vulnerability named ‘HTTPoxy’ was announced, affecting some server‑side web applications that run in CGI or CGI‑like environments, such as some FastCGI configurations. Languages known to be affected so far include PHP, Python, and Go. A number of CVEs have been assigned, covering specific …

Read More »

Use Tor? Riffle promises to protect your privacy even better

Privacy-minded people have long relied on Tor for anonymity online, but a new system from MIT promises better protection and faster performance. Dubbed Riffle, the new system taps the same onion encryption technique after which Tor is named, but it adds two others as well. First is what’s called a …

Read More »

How-To: Create a Cron Job to start MySQL if it Stops

Sometimes server act weird and stop some services due to any issue. I faced this issue with my  sites , where MySQL service stops after running the clean script to remove demo demo sites after three days. So I created a Cron Job on my AWS Ubuntu Instance to check if and start …

Read More »

3 Popular Drupal Modules Found Vulnerable — Patch Released

On Wednesday, Drupal’s security team revealed that a “critical” remote code execution vulnerabilities have left at least 13,000 websites at risk due to the use of specific, vulnerable modules. 1. RESTful Web Services – a popular module used for creating REST APIs, which is currently installed on at least 5,804 …

Read More »

How to download and play Pokemon Go without Virus

Pokémon Go is Nintendo’s first foray into augmented reality apps for Apple and Android devices, and it has already proved to be incredibly popular, with Pokémon players around the world downloading the app and hunting for pocket monsters. Although most of the world can’t wait to catch Pokémon on their …

Read More »

How to build secure Android application

App security issues With the maturity of mobile operating systems are maturing and App development process, security issues App to get more and more attention, a lot of security issues while App is exposed, among Android staggering, such as App decompiled placement, App easily get caught, simulation App crawling data …

Read More »

Android malware ‘Hummer’ could be biggest trojan ever

Security researchers at Cheetah Mobile Security Research Lab believe they could have discovered one of the largest trojan families of all time, affecting millions of Android devices around the world when it was in full swing. The mobile phone trojan family, known as “Hummer,” gained traction in early 2016 when …

Read More »

Server-side YouTube V3 OAuth API (CakePHP)

To make this work, you’ll need to create a dummy web application that can capture the refresh token generated when you authorize your app.here am using this as a cakePHP component. Creating your project You’ll need to head over to https://console.developers.google.com/ and create a new project. Then go and enable the YouTube Data …

Read More »