Source: National Cyber Security – Produced By Gregory Evans The report that hackers may have obtained the code to the National Security Agency’s own key hacking tools and put it on the internet is alarming, to say the least. At this point it is not clear if the hackers, The…
Vine vulnerability lets hacker download the complete source code
Source: National Cyber Security – Produced By Gregory Evans A hacker looking for bug bounties has stumbled across a security hole in Vine that allowed him to download the entire source code from a publicly accessible website. He was awarded over $10,000 for the discovery of the blatant internal oversight….
Flickr vulnerable to SQL Injection and Remote Code Execution Flaws
Source: National Cyber Security – Produced By Gregory Evans Flickr, one of the biggest online photo management and sharing website in the world was recently impacted by critical web application vulnerabilities, which left website’s database and server vulnerable hackers.Ibrahim Raafat, a security researcher from Egypt has found SQL injection vulnerabilities…
2 Billion Lines Of Code For Google’s Internet Services And Its All In One Place
Google’s Internet Services Has 2 Billion Lines Of Code, Which Is 40 Times Size Of The The Windows According to Google Engineering Manager, Rachel Potvin at an engineering conference in Silicon Valley on Monday estimated that the software required to run all of Google’s Internet services from Gmail to Google…
Force Touch appears in iOS 9 source code?
Apple has officially revealed that it will unveil the next generation iPhone models on September 9th. One of the new features expected on the Apple iPhone 6s and Apple iPhone 6s Plus is Force Touch. Found on the Apple Watch, Force Touch allows the screen to differentiate between a regular…
How to download Windows Phone apps using this Chrome browser QR code generator
Earlier this year, I wrote a tip for those using Google Chrome as their primary web browser. Although Microsoft’s Edge is getting extension support later this year, including the porting of Chrome extensions, Chrome has them right now. The extension that I am talking about simply auto-generates a localized QR…
“Car code stealing” popular among hackers
A warning for drivers: if you use keyless entry to get into your car, hackers have caught on and are ready to strike. “I wouldn’t say that malls would necessarily be bigger targets because the cars are pretty transient,” said […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Oracle’s Java Cloud Service open to code execution hacks.
Security Research shows 30 technical details along with exploit code in oracle’s Java Cloud. Some of these exploits allows to modify user’s data and even execute malacious codes. Poland-based Security Explorations typically withholds such public airings until after any vulnerabilities have been fixed to prevent them from being exploited maliciously. …
Join the fight against surveillance. Add the banner code to your…
Join the fight against surveillance. Add the banner code to your site today The banner changes automatically based on the nationality of the visitors. Adding to your banner is simple, just add the code below to your site, just before the closing tag. (function(){var e=document. Read More…. View…
Lastline’s Innovative Anti-Hacking Service Detects and Protects Against Malware Code
Traditional anti-virus software is designed to detect the malware, or malicious software, before it disrupts and then distributes sensitive, personal information to unintended recipients. The trouble with some of those software programs, however, is speed and accuracy. As technology has progressed, so have the cyber hackers, a detail not lost on UC Santa…