Geeks' Corner
22,000 vulnerable containers found open on the cloud
Cloud credentials, an old problem resurfaces
Cloud related bug reports jump 275 percent
Cloud related Bugs found in QNAP Q'Center web console
Cloud related vulnerabilities patched by IBM and Apache
Cloud skills in demand for 2018
Cloud skills needs to be properly updated for IT department
Docker containers make money for cryptomining criminals
Improperly configured reverse proxy servers vulnerable to data leaks
Microsoft's new underwater data center
Resiliency in a multi cloud world
Samba patches for two security vulnerabilities available
Security concerns remain in a post CloudPets world
The future of serverless computers and relational databases
The most common cloud data management mistakes
Weight Watchers internal infrastructure exposed due to unprotected server
15 Billion Credentials Currently For Sale on Hacker Forums
17 percent of all infected pirated content were from Game of Thrones
20 Year Old Bug in Microsoft Code
500 Million Facebook Accounts Leaked Online500 Million Facebook Accounts Leaked Online
A Temporary Fix Issued For HiveNightmare / SeriousSAM
Adobe Patches Photoshop in Emergency Update
Adobe Tells Users to Uninstall Flash Player
AgentTesla Trojan Malware Uses Covid-19 as Cover To Infect Users
Alien Trojan Bypasses Two Factor Authentication
All AMD CPUs Affected by New Side Channel Attacks
AMD investigating reports of critical vulnerabilities found in Ryzen chips
Another Bug in Windows Print Spooler
Another Chrome Use-After-Free Flaw Disclosed
Another Intel Chip Flaw Exposes Encryption Keys
Apple and Google Are Still Tracking Mobile Telemetry Data
Apple Fixes Critical WebKit Flaws in iOS, Safari
Apple Issues Critical iPhone Updates
Apple M1 Macs appear to be chewing through their SSDs
Apple Patches Zero-Day Flaws Under Active Attack
Apple T2 Chip Flaw Allows Root Access
Apple's New Design May Be The End For Dongles
Apples patches Intel bugs
Apples patches several flaws for iOS 12.2
APT36 uses Coronavirus to Spread Crimson RAT
Avast Network Hacked Again
AWS Malware Harvests Credentials and Installs Cryptominers
BitCoin Clipper Malware steals funds from cryptocurrency wallets
BlueKeep Bug Still Threatens Windows Systems
BootHole flaw Affects Linux and Windows systems
Catalina 10.15 Fixes a Dozen Bugs
Chrome 76 Blocks Adobe Flash Player Support
Chrome Browser Bug Exposes Exposes User Data
CISA Issues Alert After Observing Surge in LokiBot Activity
Citrix attacked by password spraying
Cloud based analytical systems becomes the tipping point for business
Cloud computing and security breaches
Cloud computing continues to grow
Cloud is safer when it comes to cyber attacks
Cloud servers vulnerable to attack
College students mine cryptocurrency in dorms
Corona virus Themed Attack Spreads Malware
Coronavirus Phishing Attacks Surge
Counter-Strike client used to create huge botnet
COVID-19 Malware Steals Data and Wipes Hard Drive
Covid-19 phishing Attack Spreads Agent Tesla Malware
COVID-19 Phishing Attacks Target U.S.
COVID-19 Phishing Email Campaign Contains TrickBot Malware
COVID-19 Relief Money Phishing Scams Steal Taxpayer Data
Cracked Versions of Office and Photoshop Steals Data and Crypto currencies
Critical Flaw Afflicts Several Intel Motherboards and Server Systems
Critical Windows Zero-Day Flaw Warning
CSIRO Data61 Bins Trustworthy Systems Team Behind seL4
December's Patch Tuesday Updates Fixes Seven Security Vulnerabilities
Don't jump on the cloud band wagon just yet
Drupal Remote Code Execution flaw affects millions of websites
Emotet Re-emerges After 5 Month Absence
ESPecter Bootkit Has Been Secretly Active Since 2012
EvilQuest Mac Malware
Facebook has been storing unencrypted passwords for years
Fake Covid 19 Map Spreading Malware
Fake Google Chrome update Bypasses Windows User Account Control
Fake IRS Emails Spreads Malware
Fake Resumes Inject Malware
Firefox 69 Disables Flash Support ad Default Tracking Cookies
Firefox Blocks Malicious Add-Ons
Firefox Critical Flaw Patched
Flaw in Sudo Gives Root Access
Fraudulent COVID-19 Relief Claims Earn Gang Millions
GMERA Trojan Targets MacOS Users To Steal Cryptocurrencies
GoDaddy shuts down 15,000 subdomains
GoldBrute attempts to brute-force millions of RDP connections
Google Chrome Will Block File Downloads
Google Chrome Zero-Day Affects Windows and Mac Users
Google Hit With $5 Billion Class Action Lawsuit
Google moves towards quantum supremacy with 72-qubit computer
Google patches Two More Chrome Zero Day Vulnerabilities
Google Removes Multiple Malicious Apps From Its Play Store
Google Removes over 100 Malicious Chrome Extensions
Google Sheets using Apps Script: Iterate a Range and set a value in each Cell
Google Translate used in latest phishing campaign
Hackers Are Increasingly Targeting MacOS
Hackers Are Using Coronavirus Fears To Hack Your Computer
Hackers Use Black Lives Matter to Spread TrickBot
Hackers Use CAPTCHA To Hide Phishing and Malware
Hackers Using Google Docs to Host Phishing Attacks
HiddenWasp Linux Malware identified
How Cloud will change IT, look at Microsoft
How Fast Is Apple's New M1 Chip? Is It Worth The Price?
Huge Botnet Built Using Cloud Services
IBM plans to move Watson Health to the cloud
IMAP based attacks increasing
Intel and AMD team up against Nvidia
Intel CPUs affected by new, Spectre like attacks
Intel Finally Patches Flaw in Security Engine
Intel Fixes Critical Flaw in AMT
Intel NUC and Nvidia Shield Flaws Fixed
Intel patches graphics drivers for Windows 10
Intel processors security bug fix could slow down PCs
Intel put a quantum computer on a chip
Intel releases first Optane SSD for desktops
Intel Tiger Lake CPUs Gets Malware Protection
iOS Malware SourMint Deployed Through Popular Advertising SDK Infects Over 1200 iOS Apps
KryptoCibule RAT Mines and Steals Cryptocurrency
Laptops Given to Vulnerable Children For Home-schooling During Lockdown Were Infected With RUSSIAN Computer Virus - Sparking Urgent Probe
Latest Intel Patches for Software Flaws
Libssh authentication bypass leaves servers open to attacks
Linux Kernel Bug Allows Remote Control
Linux kernel flaw allows remote execution
Linux Malware Warning
Linux on Apple M1 Project Reveals New Details About M1 System Architecture
Lucifer Malware Propagates Itself
MacOS flaw disclosed by Project Zero
MacOS X Available on AWS
Magellan 2.0 flaws affect Google Chrome
Major security flaw found in Intel Chipset used by most computers
Malware Attacks Against Mac
Malware Hidden In .WAV Files
Malware Hides Itself Using an Open Source Tool
Microsoft Internet Explorer Remote Code Execution Flaw Patched
Microsoft June Patch is Largest-Ever Update
Microsoft launches Windows 10 on ARM
Microsoft Meltdown-Spectre update crashes AMD PCs
Microsoft Now Blocks over 140 File Extensions
Microsoft Office Targeted By New Malware
Microsoft Office zero day allows access outside sandbox
Microsoft Outlook breach impacts MSN an Hotmail
Microsoft Patches Crypto Spoofing Flaw
Microsoft Patches Two Zero Day Vulnerabilities
Microsoft releases quantum computing development kit preview
Microsoft September Patches
Microsoft Signed a Driver That Turned Out To Be a Malicious Rootkit
Microsoft Update Breaks Windows Defender
Microsoft Will Kill Internet Explorer in August 2021
Microsoft's latest patch causing issues with antivirus programs
Millions of PCs are Vulnerable Due to Thunderbolt Flaws
Most of the Printers and Webcams Open to Cyberattacks
NetSupport RAT spread through Fake Coronavirus Report Emails
New Malware Strains Trickbot and Emotet Can Bypass Antivirus Software
New Research: These Anti-malware Products Failed To Stop Online Threats
New virus doesn't a file during infection
Nvidia announces Titan V CPU
Nvidia patches GeForce Experience bug
Nvidia releases GeForce GTX 1070 Ti
Old tech still not properly wiped
One In Five Feel More At Risk Of Cybercrime And Fraud Since Lockdown
Over 250 Facebook Users' Phone numbers Were Exposed Online
Parler website partially returns with support from Russian-owned technology firm
Passport Technology Inc. and Automated Systems America Inc. Combine to Form Leading Gaming Payments Technology Company
Phishing Campaign Impersonates U.S. Treasury To Steal Taxpayer Credentials
Pirated Software Blocked By Novel Malware
Play with Docker vulnerability
Preparing your data when moving to the cloud
PrintNightmare Bug Partially Patched By Microsoft
Purple Fox Malware's New Worm Capabilities
Raccoon Malware
Raccoon Stealer Propagates Through Google SEO
Ragnarok Ransomware Gang Releases Decryptor
Ransomware on the rise
Researchers find new malware that uninstalls cloud security software
Researchers prove kernel is secure
REvil Ransomware Attack
REvil Ransomware Code Used by LV Ransomware
REvil Ransomware Creates Auction Site for Stolen Data
RunC Security Flaw could allow cascading attacks
Samsung GDDR6 memory with 16Gbps speeds comming soon
SandCat exploiting recently patched Win32k flaw
Sarwent Malware Opens RDP Ports For Future Attacks
Security flaw in Mac OS High Sierra
Security Flaw in Microsoft Signed Drivers
Serious Bugs in Nvidia Graphics Drivers
Serious Privacy Flaw in Safari Allows One-Click Webcam Access
Serious Zoom Security Flaw Lets Websites Control Mac Camera
Slack Bug Allows Remote Malware Injection
Smartwatches that learn your every move
Speakup sets up for attack
Stolen Corporate Credentials Found in Google Searches
SupportAssist Flaw Affects Millions of Dell PCs
TeamTNT Target Multiple OS in New Chimaera Campaign
The End of Flash
The public cloud is fast becoming a strategic tool
Thunderclap security flaw
TrickBot Attack Exploits COVID-19
Two cloud security myths
Two Microsofts: the good and the not so bad
UEFI Bootkit Targeting Organizations
Unpatched flaw in WooCommerce Checkout
UNSW unveils a complete quantum computer chip design
Updated Joker Malware Returns To Android Apps
USB C
Vim and Neovim Bug Could Allow Trojan Code
VLC Media Player Vulnerability
Water Plant in Florida Hacked
Why Video Conferencing Is Here to Stay
Why Your Windows Taskbar Should Always Be on the Left or Right Side of the Screen?
Window 10 Update is Causing Systems to Freeze
Windows 10 PrintNightmare vulnerability Patched Again
Windows 11 Patch Makes The AMD CPU Problem Worse
Windows security flaw allows hacker to fake security dialog boxes
Windows Zero-Day is being actively exploited
WinRAR flaw allows hackers to gain full control over computer
WolfRAT Malware Targets WhatsApp, Facebook Messenger
WordPress Plugin Flaws Still Being Exploited
Yet Another Un-patched PrintNightmare Zero-Day Warning From Microsoft
Zero-Day Flaw in Mojave
ZIP and MP3 Files Hidden Inside PNG Files on Twitter
Zloader Malware Exploits Microsoft Digital Signature Verification
Zombie computer viruses that refuse to die
Zoom Flaw Allowed Hackers To Crack Meeting Passcodes
Defining a Class in PHP
An object in programming has two characteristics: state and behavior. The state in an object is stored in variables that are referred to as properties. The behavior in an object consists of functions or methods. In order for an object to be created, there must be a blueprint or definition of the object. This blueprint, in programming, is called a class. In this article, we will discuss what is involved in defining a class. ...
Memory management and the Stack
The OS allocates memory for each process or program for data and code. The memory allocated for each process consists of many parts: the stack holds local variables, the heap holds dynamic memory, the data segment holds global variables, and finally the code segment which holds the code is and read only. Memory management depends on the hardware and the operating system. ...
Variable Scoping in Go
A scope in any programming is a region of the program where a defined variable can exist and beyond that the variable cannot be accessed. There are three places where variables can be declared in Go programming language. The first is local variables which are declared inside a function or a block. The second is global variables which are declared Outside of all functions. The last is parameters which are in the definition of function parameters. In this article, we will discuss what local va ...
Go Variables
A variable is a name given to a storage area that the programs can manipulate. Each variable in Go has a specific type, which determines the size and layout of the variable's memory, the range of values that can be stored within that memory, and the operations that can be applied to the variable. The name of a variable can contain letters, digits, and the underscore character. It must begin with either a letter or an underscore. Upper and lowercase letters are distinct because Go is case-sensit ...