Google announced the block of code injection from third-party applications into the Chrome browser. Developers have 14 months to update their code. Google continues to improve security of its product and services, the IT giant announced the for blocking third-party applications from injecting code into the Chrome browser. The decision of the company will have […]
Siemens published a security advisory to confirm that four of the seven Dnsmasq vulnerabilities affect some of its SCALANCE products In October, Google security experts disclosed seven distinct vulnerabilities in the Dnsmasq software package. From the authorsâ website, âDnsmasq provides network infrastructure for small networks: DNS, DHCP, router advertisement and network boot.â In practice, the Dnsmasq code has been widely leveraged in […]
Ship loading and container load plans are vulnerable to hack because are created without using a secure messaging system. Transportation is not immune from hacking attacks, aircraft and vessels can be compromised by cyber criminals and nations state actors exactly like any other system. Today let’s speak about ship loading and container load plans that are […]
The Iran-based security researcher Pouya Darabi discovered a method to delete any photo from Facebook exploiting a flaw in the polling feature. The Iran-based security researcher Pouya Darabi received a $10,000 bounty from Facebook after reporting a critical vulnerability that could have been exploited to delete any photo from the social network. Early this month, the social network […]
Mozilla developer revealed the Firefox browser will soon include a new feature to notify users who visit sites that suffered a data breach Firefox browser is going to introduce a new security feature to make the users’ experience online more secure, it will warn users if they visit websites that have experienced data breaches. The news was […]
The advent of Artificial Intelligence has brought with it a new scope for cybersecurity. Why the artificial intelligence is important for cybersecurity? In my last blog, I discussed AI and Big Data. Now, I am going to explain about AI and Cybersecurity. The advent of Artificial Intelligence has brought with it a new scope for […]
Almost any PC vendor announced the imminent release of fixes for the flaws in Intel Management Engine, but many of them will be available only in 2018. Intel has started to issue security updated to fix multiple flaws in Intel’s CPUs, unfortunately many of them will not be available to the end-users until 2018. The tech giant […]
The Open Web Application Security Project (OWASP) presented the final release for the 2017 OWASP Top 10. The Open Web Application Security Project (OWASP) published the final version of the 2017 OWASP Top 10. In April, the OWASP announced the first release candidate for the 2017 OWASP Top 10, the main novelty was represented by the presence […]
Global Cyber Alliance launched the Quad9 DNS service, the free DNS service to secure your online experience and protect your privacy. The Global Cyber Alliance (GCA) has launched the Quad9 DNS service (9.9.9.9), a new free Domain Name Service resolver that will check user’s requests against the IBM X-Force’s threat intelligence database. The Quad9 DNS service non only […]
The code hosting service GitHub warns developers when including certain flawed software libraries in their projects and suggest fixes to solve the issues. The code hosting service warns developers when including certain flawed software libraries in their projects and provides advice on how to address the issue. GitHub has recently introduced the Dependency Graph, a […]