MySQL Zero-Day Allows An Attacker To Take Full Control Of Database » TechWorm
http://www.techworm.net/2016/09/mysql-zero-day-allows-attacker-take-full-control-database.html Two vulnerabilities found and proof-of-concept code published. →
http://www.techworm.net/2016/09/mysql-zero-day-allows-attacker-take-full-control-database.html Two vulnerabilities found and proof-of-concept code published. →
https://theintercept.com/2016/09/12/long-secret-stingray-manuals-detail-how-police-can-spy-on-phones/ Some reading on how cell phones are spied. Although “Stingray” has become a catch-all name for devices of its kind, often referred to as “IMSI catchers,” the manuals include instructions for a range of other Harris surveillance boxes, including the Hailstorm, ArrowHead, AmberJack, and KingFish. →
http://www.gadgetsay.com/2016/09/top-5-vulnerable-sites-to-practice-your-hacking-skills-legally/ Security people need places to practice. →
https://thelasttechie.com/2016/09/09/bug-free-code-thats-a-lie/ All code has bugs. →
http://arstechnica.com/security/2016/09/stealing-login-credentials-from-a-locked-pc-or-mac-just-got-easier/ Plug in $50 tiny Linux computer to Windows computer USB port and get login access credentials in 20 seconds. →
http://thehackernews.com/2016/09/hack-android-phone-security.html?m=1 Serious bug in Android just revealed. You might need to wait until your phone manufacturer/operator starts has update available. →
https://pentestmag.com/write-secure-code-cc-programming-languages/ This article list many things you should keep in mind when writing software with C and C++. →
http://news.softpedia.com/news/mirai-ddos-trojan-is-the-next-big-threat-for-iot-devices-and-linux-servers-507964.shtml This nasty trojan is targeted against Linux IoT devices. Mirai is an evolution of an older trojan, also used for DDoS attacks, known under many names, such as Gafgyt, Lizkebab, BASHLITE, Bash0day, Bashdoor, and Torlus. Mirai’s mode of operation is largely the same as Gafgyt, targeting IoT devices running Busybox. The trojan also targets →
http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/how-a-massive-540-gbsec-ddos-attack-failed-to-spoil-the-rio-olympics/ Rio Olympics was under constant heavy DDoS attack from IoT botnet – and still they managed to keep everything working. →
https://www.entrepreneur.com/article/25330 →