Critical flaw leaves thousands of Cisco Switches vulnerable to remote hacking

Security researchers at Embedi have disclosed a critical vulnerability in Cisco IOS Software and Cisco IOS XE Software that could allow an unauthenticated, remote attacker to execute arbitrary code, take full control over the vulnerable network equipment and intercept traffic. The stack-based buffer overflow vulnerability (CVE-2018-0171) resides due to improper validation of packet data in … Continue reading Critical flaw leaves thousands of Cisco Switches vulnerable to remote hacking

Apple Plans to Replace Intel Chips in Macs with its Custom Designed CPUs

In a major blow to Intel, Apple is reportedly planning to use its custom-designed ARM chips in Mac computers starting as early as 2020, ultimately replacing the Intel processors running on its desktop and laptop hardware.   The company makes its own A-series custom chips for iPhones, iPads and other iThings, while the Mac devices use Intel x64 silicon. Now according to a report from Bloomberg, Apple plans to replace Intel's Mac chips with its own homegrown CPUs.   The report says Apple executives have a project, codenamed "Kalamata," that designs desktop-grade Arm-compatible processors, along with a macOS port, allowing the company to craft a uniform architecture across all of its product lines.   The report also says this changeover would be part of a "multi-step transition" to make iOS devices and Macs "work more similarly and seamlessly together," helping Apple's plan (project codename 'Marzipan') to bring iOS apps to Mac for software cross-compatibility.   The changeover is likely to be in the wake of recent high-profile security issues around Intel chip architecture and chips from other manufacturers. It is similar to the approach Apple has taken in the past by switching to PowerPC architecture in 1991 and to Intel in 2006.   With the changeover, Apple would not have to share 5% of its annual revenue with Intel and pay for exclusive deals to offer high-end processors first to its customers, and competitors would not be able to copy innovations so easily. Switching to its own chips would also allow the company to control its own hardware roadmap better, and offer better performance to its users.   Bloomberg also notes that the revised Mac Pro laptops arriving next year will include an Apple-developed chip, and other Mac laptops will also receive Apple-developed chips this year.   Soon after the Bloomberg report was published, Intel’s stock price took a hit and dropped by 9.2 percent, the biggest intraday drop in over two years. They are down 6.07 percent at $48.92 at the time of writing.   Rumors of Apple ditching Intel and switching to its own custom silicon have been circulating for a decade. Last September, a report also claimed Apple was looking to cut back on its reliance on Intel, but nothing of that sort happened. Both Apple and Intel did not yet respond to the report.

Android Trojan Steals Data From Facebook Messenger, Skype, Other IM Clients

Security researchers have found a new Android malware strain that has been designed to steal data from mobile instant messaging clients. This new trojan is quite simple in its design, researcher from cyber-security firm Trustlook said in a report published on Monday. Trojan has only a handful of features The trojan has only a few … Continue reading Android Trojan Steals Data From Facebook Messenger, Skype, Other IM Clients

Google Bans Cryptocurrency Mining Extensions From Chrome Web Store.

In an effort to prevent cryptojacking by extensions that maliciously mine digital currencies without users' awareness, Google has implemented a new Web Store policy that bans any Chrome extension submitted to the Web Store that mines cryptocurrency. Over the past few months, we have seen a sudden rise in malicious extensions that appear to offer … Continue reading Google Bans Cryptocurrency Mining Extensions From Chrome Web Store.

The Biggest Vulnerability Ever Found on CPU.! – Meltdown & Spectre.

There are New Vulnerabilities named Spectre and Meltdown, which exploit critical vulnerabilities in modern processors have just been discovered by Expert Cyber Security researchers. These hardware bugs allow programs to steal data being processed on the computer. You can View the Documentation about these Spectre Documentation and Meltdown Documentation.   The Meltdown Vulnerability Meltdown breaks the most fundamental … Continue reading The Biggest Vulnerability Ever Found on CPU.! – Meltdown & Spectre.

The Security Value of the robots.txt file

DISCLAIMER This tutorial is only for Educational purposes. Please don't use these kind of attacks for unethical purposes. The "robots.txt" file is one of the primary ways of telling a search engine where it can and can't go.This is called the robots exclusion protocol. The robots.txt file is read by search engine spiders.The first thing … Continue reading The Security Value of the robots.txt file

How I solve MD5 Games 1 – Hack Dat Kiwi 2017

Let's  see how the challenge code looks like. <?php $md5=$_GET['md5']; if($md5==md5($md5)){ echo "The correct value is ...."; }else{ echo "Wrong"; } I didn't remember the original code but it's very similar to this. $md5==md5($md5)  How is this posible? Thats the point. If you read read this Article you can see , $md5='0ebc12423'; // start with 0e if … Continue reading How I solve MD5 Games 1 – Hack Dat Kiwi 2017

Facebook App Development with OAuth 2.0

What is OAuth (Open Authorization), and how it works? OAuth allows notifying a resource provider (e.g. Facebook) that the resource owner (e.g. you) grants permission to a third-party (e.g. a Facebook Application) access to their information (e.g. the list of your friends). You can use OAuth to get a token via a callback url and … Continue reading Facebook App Development with OAuth 2.0