Thursday , March 28 2024 6:58 PM
Home / Top 5 (page 3)

Top 5

Apple issues critical iOS update to thwart ‘Pegasus’ malware

Security researchers have identified a three-headed monster that could be used to record sounds, collect passwords, read text messages, record calls and track users. All iOS versions 9.3.4 and below are vulnerable. The attack utilizes a mobile spyware product, ‘Pegasus,’ created by NSO Group — an Israeli cyber warfare company — designed to attack high-value …

Read More »

How To Move an Apache Web Root to a New Location on Ubuntu 16.04

Introduction On Ubuntu, by default, the Apache2 web server stores its documents in /var/www/html, which is typically located on the root filesystem with rest of the operating system. Sometimes, though, it’s helpful to move the document root to another location, such as a separate mounted filesystem. For example, if you …

Read More »

limit the amount of WIFI bandwidth roommate or bad office colleague uses?

Not all Internet traffic is equal. Streaming HD video or having a stutter-free Skype call is probably more important to you than downloading a big file. The Quality of Service feature on your router lets you prioritize the things you care about, so they happen faster than the things you …

Read More »

Data Breach — Oracle’s Micros Payment Systems Hacked

The risks associated with data breaches continue to grow, impacting a variety of industries, tech firms, and social networking platforms. In the past few months, over 1 Billion credentials were dumped online as a result of mega breaches in popular social networks. Now, Oracle is the latest in the list. …

Read More »

Best Password Manager

When it comes to safeguarding your Internet security, installing an antivirus software or running a Secure Linux OS on your system does not mean you are safe enough from all kinds of cyber-threats. Today majority of Internet users are vulnerable to cyber attacks, not because they aren’t using any best …

Read More »

How to Protect Your Server Against the HTTPoxy Vulnerability

What Is HTTPoxy? On July 18th, a vulnerability named ‘HTTPoxy’ was announced, affecting some server‑side web applications that run in CGI or CGI‑like environments, such as some FastCGI configurations. Languages known to be affected so far include PHP, Python, and Go. A number of CVEs have been assigned, covering specific …

Read More »

Use Tor? Riffle promises to protect your privacy even better

Privacy-minded people have long relied on Tor for anonymity online, but a new system from MIT promises better protection and faster performance. Dubbed Riffle, the new system taps the same onion encryption technique after which Tor is named, but it adds two others as well. First is what’s called a …

Read More »

How to download and play Pokemon Go without Virus

Pokémon Go is Nintendo’s first foray into augmented reality apps for Apple and Android devices, and it has already proved to be incredibly popular, with Pokémon players around the world downloading the app and hunting for pocket monsters. Although most of the world can’t wait to catch Pokémon on their …

Read More »

Android malware ‘Hummer’ could be biggest trojan ever

Security researchers at Cheetah Mobile Security Research Lab believe they could have discovered one of the largest trojan families of all time, affecting millions of Android devices around the world when it was in full swing. The mobile phone trojan family, known as “Hummer,” gained traction in early 2016 when …

Read More »

Server-side YouTube V3 OAuth API (CakePHP)

To make this work, you’ll need to create a dummy web application that can capture the refresh token generated when you authorize your app.here am using this as a cakePHP component. Creating your project You’ll need to head over to https://console.developers.google.com/ and create a new project. Then go and enable the YouTube Data …

Read More »