Geeks' Corner

Topic in SECURITY :

A sophisticated botnet found dubbed Mylobot

Bitcoin Baron gets 2 years in jail

cisco issues another patch for webex flaw

Cisco patches critical authentication flaws

Cisco patches critical bugs in its VOIP phones

Cisco patches Secure Internet Gateway service

Complex situation for GDPR compliance.

Critical vulnerability finally patches in ISP broadband equipment

Critical vulnerability finally patches in ISP broadband equipment

Cryptomining hack on ISP grade routers found

DanaBot trojan targets bank customers

Data breach at LabCorp may affect millions

DDoS attacks get smarter

Exploit kits still the number one web-based threat

FBI arrests 74 in business email compromise crackdown

FBI recommends rebooting routers to minimize VPNFilter risk.

Google Home and Chromecast leaking location information

Hackers making money on cryptocurrency scams.

Home fiber routers vulnerable.

Kitty cryptomining malware.

Krack attack highlights wifi security flaw.

Malware spread through Facebook downloads cryptomining code and steals credentials.

Marriott Data Breach

Marriott Data Breach

Marriott Data Breach

Prowli leverages weak Iot devices and servers for profit.

Roaming Mantis malware evolves into crytomining and iOS phishing.

Roku and Sonos open to hack

Router flaw that leaked wi-fi passwords patched by Comcast.

Rowhammer targets Android devices again

Samsung looks into claims of random texting of images to contacts

Security flaw in Red Hat could allow full root access.

SMB malware, Hidden Cobra strikes again.

SMB malware, Hidden Cobra strikes again.

VPNFilter malware infects half a million home routers.

WannaCry kill switch hero faces new charges.

WordPress plugin bug allows any user to be able to get admin access

18 Android Models Under Attack

Amazon Echo and Kindle Devices Affected by KRACK WiFi Bug

Backdoor trojan found in CCleaner

Bluetooth Flaws Could Allow Global Tracking of iOS and Windows

Botnet for hire from TheMoon

Bug in NVIDIA’s Tegra Chipset

Call-Girl Search-Engine Pollution Hits WordPress Sites

Card skimming scripts hiding as Google Analytics and Angular

Cisco Aironet Access Point High-Severity Flaws

Cisco fixes flaw in wireless VPN routers

Cisco Flaw Allow Remote Control of Routers

Cisco flaw leaves small business networks vulnerable

Code Snippets WordPress plugin Vulnerability Patched

Crypto-mining malware is the number one threat in 2018

D-Link and Comba Router Flaws Leaking Credentials

D-Link Cloud Camera Flaw gives access to video streams

D-Link Home Router Flaw Won't Be Patched

DarthMiner strikes MacOS

DDoS Attacks Takes Down Wikipedia and World of Warcraft

Dirty Sock vulnerability gives hackers root access to Linux systems

Docker filled with Graboid Cryptomining Worm

Equifax Settles 2017 Data Breach

Feds Warn of Security Issues With Smart TVs

Fileless malware makes a comeback

Google Announces $1M+ Bounty

Google Fixes DoS Flaw in Android

GoScanSSH targets public facing SSH servers but avoids government systems

Hackensack Meridian Pays Ransomware

Hackers Impersonate USPS to Deliver Malware

Hackers use Google Cloud to attack home routers

Honda Database Leaks Customer Data Again

HTTP/2 Implementation Flaws Opens Websites to DoS Attacks

Internet Connected Toys Puts Kids at Risk

IoT Radios Vulnerable Due to Telnet Flaw

Linux Servers Vulnerable Due to Exim Flaw

LokiBot trojan found hidden in .PNG files

Louisiana Gov Declares Emergency Due to Cyberattacks

MacOS security flaw exposes Safari browser history

Malicious Microsoft Office attachments trick their victims

Malware hidden in ad based images targets Mac

Malware uses Obfuscation To Avoid AV

Marriot data breach impact lowered after forensics.

Microsoft patches zero day flaws in February Patch Tuesday

Microsoft will stop releasing updates via SHA-1 code signing

Millions of Home Cable Modems at Risk

Mirai evolves and broadens range of CPUs

Mozilla adds anti tracking in Firefox 65

Networked Printer Vulnerabilities

New Gafgyt Botnet Targets Game Servers

New Lazarus Group MacOS Malware Found

New Malware Hijacks HTTPS

OSX malware can steal crypto currency

PHP Flaw Allows Hackers to Control NGINX Servers

Popular TV Streaming Platform Ministra Vulnerable to Hijacking

Popular WordPress Plugin Flaw is Being Actively Exploited

Rarog turns computers into cryptocurrency mining machines

Remote code execution flaws in RDP Clients

Researchers at IBM come up with AI powered malware

Researchers Find New Flaw in Modern Intel CPUs

Rich Reviews Plugin Flaw Has No Fix

Roboto Botnet Targets Linux Webmin Servers

Routers and NAS From Major Manufacturers Full of Flaws

Sanny malware adapts and reemerges

SLoad Trojan Employs BITS

Smart TVs Are Sending User Data Even When Idle

SmarterASP.NET Recovering From Ransomware Attack

Smartwatch Exposes Kids' GPS data

Smominru cryptocurrency miner makes millions for hackers

Steganography Hack Can Compromise Websites

Stegware use increases for hackers

Tax Scams Increase as Tax Season Approaches

TP-Link smart home router zero day bug found

TrickBot Goes After SSH Keys

Verizon router flaw affects millions

Vulnerability in Alexa Google Can Be Exploited To Eavesdrop

WordPRess Plugin Bug Affects 700,000 sites

WordPress plugin flaw in Yuzo being exploited

WordPress Plugin Flaws Exploited In Malicious Advertising Campaign

WordPress vulnerabilities up 20 percent in 2018

Xiaomi Mijia Security Camera Flaw Found By Reddit User

Memory management and the Stack

A stack organizes a set of data elements in a Last In, First Out ( LIFO ) manner. The three basic operations on a stack are: push which adds a new element to the top of the stack, pop which removes an element from the top of the stack, and a check to see if the stack is empty. ...

Variable Scoping in Go

Variables that are declared inside a function or a block are called local variables. They can be used only by statements that are inside that function or block of code. Local variables are not known to functions outside their own. The following example uses local variables. ...

Go Variables

A variable definition tells the compiler where and how much storage to create for the variable. A variable definition specifies a data type and contains a list of one or more variables of that type. There are two types of variable declarations, explicitly typed variables and implicitly typed variables. Below is an example of an explicitly typed variable ...

Python Tuples

We can tuple just like we create a list, except that we use regular brackets instead of square brackets. If we create a tuple with a single item, we need to include a comma at the end, otherwise we'll end up with a string. Tuples can hold different data types including lists so we can have a tuple with an element being a list. We access the values in a tuple by using the variable name with an index value enclosed in square brackets. We can also pick a range of values by using two indices se ...