MS Office Built-In Feature Could be Exploited to Create Self-Replicating Malware

Earlier this month a cybersecurity researcher shared details of a security loophole with The Hacker News that affects all versions of Microsoft Office, allowing malicious actors to create and spread macro-based self-replicating malware. Macro-based self-replicating...
video

Security finally got the awareness it needed in 2017. Now what?

The first week of October's Cybersecurity Awareness Month kicked off with a bang. But it wasn't so much because the campaign itself succeeded at generating awareness about digital threats. Just three days into the month, former Equifax...

Tether Hacked — Attacker Steals $31 Million of Digital Tokens

Again some bad news for cryptocurrency users. Tether, a Santa Monica-based start-up that provides a dollar-backed cryptocurrency tokens, has claimed that its systems have been hacked by an external attacker, who eventually stole around $31...

After Getting Hacked, Uber Paid Hackers $100,000 to Keep Data Breach Secret

Uber is in headlines once again—this time for concealing last year's data breach that exposed personal data of 57 million customers and drivers. On Tuesday, Uber announced that the company suffered a massive data breach in October...

Apple Posts 4 New Ads Promoting iPhone X Face ID And Animoji Features

Apple has posted four new videos on its official Youtube page promoting some of the biggest features of iPhone X. The videos titled Opens in the Dark, Knows You When You Change, Introducing Face...

Modern Language Wars, PHP vs Python vs Ruby

PHP or Python — Which Language Should You Learn in 2017 2017 is the year of web apps and API’s. Instead of reinventing the wheel every time, developers make use of scaffoldings and third-party libraries to ensure that...

New Mirai Botnet Variant Found Targeting ZyXEL Devices In Argentina

While tracking botnet activity on their honeypot traffic, security researchers at Chinese IT security firm Qihoo 360 Netlab discovered a new variant of Mirai—the well known IoT botnet malware that wreaked havoc last year. Last...

Google Collects Android Location Data Even When Location Service Is Disabled

Do you own an Android smartphone? If yes, then you are one of those billions of users whose smartphone is secretly gathering location data and sending it back to Google. Google has been caught collecting location...

Client-side vs Server-side Validation in Web Applications

Happy Sunday from Software Expand! In this week's edition of Feedback Loop, we talk about the future of Windows Phone, whether it makes sense to build media centers discuss the preferences for metal vs....
video

Internet Hackers in 2017 Documentary

Internet Hackers in 2017 Documentary https://www.youtube.com/watch?v=fX3JReuIMyo  
- Advertisement -

LATEST NEWS

MUST READ