Mobile OWASP Top 10 (2016) : Android

Mobile OWASP Top 10 (2016) : Android

ANDROID Android is the name of the operating system used on many smartphones and tablets. It is owned and maintained by Google. Google bought Android in 2005 and launched it for phones and tablets in 2007, the same year Apple released the first iPhone. An operating system is basically what appears on the screen on a touchscreen device – the underlying software that you interact with. This is different to apps you can download to use for it like you…

Read More Read More

Janus Vulnerability in Android (CVE-2017-13156)

Janus Vulnerability in Android (CVE-2017-13156)

A serious vulnerability (CVE-2017-13156) in Android allows attackers to modify the code in applications without affecting their signatures. The root of the problem is that a file can be a valid APK file and a valid DEX file at the same time. We have named it the Janus vulnerability, after the Roman god of duality. Why we call it Janus vulnerability? The Janus vulnerability stems from the possibility to add extra bytes to APK files and to DEX files. On…

Read More Read More

Cryptocurrency exchanges Security Vulnerabilities

Cryptocurrency exchanges Security Vulnerabilities

There are approximately 130 cryptocurrency exchanges around the globe today. Most are based in Asia. They’ve existed in a foggy no man’s land of oversight that banks only dream of. Because of the trans-national locations of these entities and the diverse composition of investor nationalities, regulatory oversight of cybersecurity standards has been virtually non-existent. For instance, the South Korean cryptocurrency exchange Coinrail confirmed that it was hacked in June 2018. According to the local news agency Yonhap, the hack resulted…

Read More Read More

Blockchain Code Audits Why do you need that?

Blockchain Code Audits Why do you need that?

“The main idea behind blockchain Technology is to provide security and redundancy through consensus to the applications in which it hosts. For example, if a blockchain is hosting a banking application and a node is hit with a DDoS, all other nodes would keep the application running.” If a node is hacked and an attacker tries to falsify the blockchain to show the attacker has more money in their account, it would not work as there would not be consensus….

Read More Read More

The Dark Side Of Smart Contracts

The Dark Side Of Smart Contracts

Blockchain is a hot topic at the moment, mostly because it’s the underlying technology behind bitcoin and other cryptocurrencies. Blockchain and cryptocurrencies go together like the Internet and email, but in the same way that you can do more with the Internet than just send emails, you can do more with blockchain than just storing bitcoin. The easiest way to think of blockchain is as a new type of database which can’t be corrupted or compromised. The blockchain itself is…

Read More Read More

High-Risk Vulnerability found in EOS Blockchain!

High-Risk Vulnerability found in EOS Blockchain!

Leading Chinese digital security firm Qihoo 360 reported of detecting a series of “epic” security vulnerabilities in the EOS network early on March 29th. These faults could allow potential attackers to gain remote access and control over any EOS node, which could have resulted in disastrous repercussions for the whole EOS network. Since the attackers would be able to control any EOS node, simply said they could do whatever they want, including Publishing malicious smart contracts, dig up cryptocurrencies, based…

Read More Read More

Blockchain Smart Contracts Posing Danger

Blockchain Smart Contracts Posing Danger

There’s a lot going on in the world of decentralized networking and not just the daily rollercoaster ride of the cryptocurrency markets. A decade after the mysterious Satoshi Nakamoto first unleashed Bitcoin on an unsuspecting world, the blockchain has grown and branched out and now a thousand flowers blossom, some of them rather peculiar blooms indeed. Look around and you’ll see that blockchains are apparently the answer to every problem. From replacing the global banking system to guaranteeing the provenance…

Read More Read More

Can My Blockchain Wallet Be Hacked?

Can My Blockchain Wallet Be Hacked?

Blockchain spreads around the world, and it is already quite obvious that the new technology may be applied in various fields. Blockchain technology is becoming a trend all around the world; millions of people are using this new mode of payment. But before you start using blockchain wallet, there are few things to clarify. Can blockchain wallets be hacked? This is one important concern among several digital currency users. A few months ago, news about a Bitcoin mining service hack…

Read More Read More

SamSam Ransomware Crew Made Nearly $6 Million From Ransom Payments

SamSam Ransomware Crew Made Nearly $6 Million From Ransom Payments

The SamSam ransomware has earned its creator(s) more than $5.9 million in ransom payments since late 2015, according to the most comprehensive report ever published on SamSam’s activity, containing information since the ransomware’s launch in late 2015 and up to attacks that have happened earlier this month. Researchers at Sophos have tracked Bitcoin addresses owned by the attackers mentioned on ransom notes of each SamSam version and found the attackers have received more than $5.9 million from just 233 victims,…

Read More Read More

Updates 53 Vulnerabilities Patched in Microsoft Releases

Updates 53 Vulnerabilities Patched in Microsoft Releases

Microsoft released Security patch for 53 Vulnerabilities in July 2018. So if you are not running an updated system go an update as fast as possible. Users are strongly advised to apply security patches as soon as possible to keep hackers and cybercriminals away from taking control of their computers. These vulnerabilities are so deadly. It will create a bad impact on your system. Affecting Products 1) Windows 2) Internet Explorer (IE) 3) Edge 4) ChackraCore 5) NET Framework 6)…

Read More Read More