MyHackerNews

Beware of Fake Instagram Apps

The problem with Google Play apps is that they’re not as curated as those in the Apple Store. Then again even the Apple Store has its failings. They’re often riddled with bugs, ads that practically make them unusable and worse, malware. In fact, some apps are malware pretending to be apps like three Instagram apps that are actually designed to…
Read More...

WPA3 Still Rough on the Edges

The newly-released Wi-Fi security standard WPA3 is apparently still rough on the edges, as security researchers have already cracked several vulnerabilities less than one year after its release. WPA3 was developed to address WPA2’s vulnerability to KRACK (Key Reinstallation Attack) attacks and other issues, but seems to have opened a new can of…
Read More...

Fake IDs for Peanuts

The Dark Web is the one-stop shop for everything shady that includes tools for identity theft and tax fraud. That’s not news. What’s news is that the former convenience store has become a drive-thru because doing the aforementioned felonies has become easier and affordable. It’s now easier for anyone who needs a new false identity to get one.…
Read More...

Your Adobe Products Need Patching

For workaholics, the thought of having to update software is always annoying, especially if it’s having to update Windows. But this applies to other software products like Microsoft’s Office and Adobe’s software suite. The latest patch Tuesday’s companion to Windows are Adobe products such as Adobe’s Acrobat and Acrobat Reader. Kindly…
Read More...

GHIDRA: The Double-Edged Tool

Just in time for the new Godzilla film, the NSA released its formerly classified reverse-engineering tool called GHIDRA. The source-code for GHIDRA version 9.0.2 is now available in Github. The NSA uses GHIDRA to look for vulnerabilities in software when source-code for the software is not available. GHIDRA would be a boon to budding and talented…
Read More...

DDoS is Down Thanks to Crackdown

There are a number of reasons why websites become victim of Dynamic Denial of Service attacks or DDoS. For example, the instigator wants to disrupt the ‘system’ by knocking out sites like Facebook or Instagram. The instigator may have an axe to grind against an establishment or government, or that instigator is a competing entity who pays others to…
Read More...

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More