Geeks' Corner

Topics in NETWORK and SECURITY :
A sophisticated botnet found dubbed Mylobot
Bitcoin Baron gets 2 years in jail
cisco issues another patch for webex flaw
Cisco patches critical authentication flaws
Cisco patches critical bugs in its VOIP phones
Cisco patches Secure Internet Gateway service
Complex situation for GDPR compliance.
Critical vulnerability finally patches in ISP broadband equipment
Critical vulnerability finally patches in ISP broadband equipment
Cryptomining hack on ISP grade routers found
DanaBot trojan targets bank customers
Data breach at LabCorp may affect millions
DDoS attacks get smarter
Exploit kits still the number one web-based threat
FBI arrests 74 in business email compromise crackdown
FBI recommends rebooting routers to minimize VPNFilter risk.
Google Home and Chromecast leaking location information
Hackers making money on cryptocurrency scams.
Home fiber routers vulnerable.
Kitty cryptomining malware.
Krack attack highlights wifi security flaw.
Malware spread through Facebook downloads cryptomining code and steals credentials.
Marriott Data Breach
Marriott Data Breach
Marriott Data Breach
Prowli leverages weak Iot devices and servers for profit.
Roaming Mantis malware evolves into crytomining and iOS phishing.
Roku and Sonos open to hack
Router flaw that leaked wi-fi passwords patched by Comcast.
Rowhammer targets Android devices again
Samsung looks into claims of random texting of images to contacts
Security flaw in Red Hat could allow full root access.
SMB malware, Hidden Cobra strikes again.
SMB malware, Hidden Cobra strikes again.
VPNFilter malware infects half a million home routers.
WannaCry kill switch hero faces new charges.
WordPress plugin bug allows any user to be able to get admin access
18 Android Models Under Attack
Amazing Ultrasound Hack Can Secretly Control Siri, Alexa and Google Now
Amazon Echo and Kindle Devices Affected by KRACK WiFi Bug
Backdoor trojan found in CCleaner
Bluetooth Flaws Could Allow Global Tracking of iOS and Windows
Botnet for hire from TheMoon
Bug in NVIDIA’s Tegra Chipset
Call-Girl Search-Engine Pollution Hits WordPress Sites
Card skimming scripts hiding as Google Analytics and Angular
Cisco Aironet Access Point High-Severity Flaws
Cisco fixes flaw in wireless VPN routers
Cisco Flaw Allow Remote Control of Routers
Cisco flaw leaves small business networks vulnerable
Code Snippets WordPress plugin Vulnerability Patched
Critical Bugs in Netgear Nighthawk Routers
Crypto-mining malware is the number one threat in 2018
D-Link and Comba Router Flaws Leaking Credentials
D-Link Cloud Camera Flaw gives access to video streams
D-Link Home Router Flaw Won't Be Patched
DarthMiner strikes MacOS
DDoS Attacks Takes Down Wikipedia and World of Warcraft
Dirty Sock vulnerability gives hackers root access to Linux systems
Docker filled with Graboid Cryptomining Worm
Equifax Settles 2017 Data Breach
Feds Warn of Security Issues With Smart TVs
Fileless malware makes a comeback
Google Announces $1M+ Bounty
Google Fixes DoS Flaw in Android
GoScanSSH targets public facing SSH servers but avoids government systems
Hackensack Meridian Pays Ransomware
Hackers Attack Popular Linksys Routers that Triggered Password Reset
Hackers Impersonate USPS to Deliver Malware
Hackers use Google Cloud to attack home routers
Honda Database Leaks Customer Data Again
HTTP/2 Implementation Flaws Opens Websites to DoS Attacks
Internet Connected Toys Puts Kids at Risk
IoT Radios Vulnerable Due to Telnet Flaw
Linksys and D-Link routers targeted by Corona-virus themed malware
Linux Servers Vulnerable Due to Exim Flaw
LokiBot trojan found hidden in .PNG files
Louisiana Gov Declares Emergency Due to Cyberattacks
MacOS security flaw exposes Safari browser history
Malicious Microsoft Office attachments trick their victims
Malware hidden in ad based images targets Mac
Malware uses Obfuscation To Avoid AV
Marriot data breach impact lowered after forensics.
Microsoft patches zero day flaws in February Patch Tuesday
Microsoft will stop releasing updates via SHA-1 code signing
Millions of Home Cable Modems at Risk
Mirai evolves and broadens range of CPUs
Mozilla adds anti tracking in Firefox 65
Networked Printer Vulnerabilities
New Gafgyt Botnet Targets Game Servers
New Lazarus Group MacOS Malware Found
New Malware Hijacks HTTPS
OSX malware can steal crypto currency
PHP Flaw Allows Hackers to Control NGINX Servers
Popular TV Streaming Platform Ministra Vulnerable to Hijacking
Popular Website Plugin Affects over 700,000 Sites
Rarog turns computers into cryptocurrency mining machines
Remote code execution flaws in RDP Clients
Researchers at IBM come up with AI powered malware
Researchers Find New Flaw in Modern Intel CPUs
Rich Reviews Plugin Flaw Has No Fix
Roboto Botnet Targets Linux Webmin Servers
Routers and NAS From Major Manufacturers Full of Flaws
Sanny malware adapts and reemerges
Serious Exchange Flaw Still Affects Over 300,000 servers
Serious Flaw in Wi-Fi Allows Eavesdropping Attacks In Over a Billion Devices
Shocking News About Popular Website Builder's Flaw is Being Exploited
SLoad Trojan Employs BITS
Smart TVs Are Sending User Data Even When Idle
SmarterASP.NET Recovering From Ransomware Attack
Smartwatch Exposes Kids' GPS data
Smominru cryptocurrency miner makes millions for hackers
Steganography Hack Can Compromise Websites
Stegware use increases for hackers
Tax Scams Increase as Tax Season Approaches
TP-Link smart home router zero day bug found
TrickBot Goes After SSH Keys
Verizon router flaw affects millions
Vulnerability in Alexa Google Can Be Exploited To Eavesdrop
WordPress plugin flaw in Yuzo being exploited
WordPress Plugin Flaws Exploited In Malicious Advertising Campaign
WordPress vulnerabilities up 20 percent in 2018
Xiaomi Mijia Security Camera Flaw Found By Reddit User


Memory management and the Stack

A stack organizes a set of data elements in a Last In, First Out ( LIFO ) manner. The three basic operations on a stack are: push which adds a new element to the top of the stack, pop which removes an element from the top of the stack, and a check to see if the stack is empty. ...

Variable Scoping in Go

Variables that are declared inside a function or a block are called local variables. They can be used only by statements that are inside that function or block of code. Local variables are not known to functions outside their own. The following example uses local variables. ...

Go Variables

A variable definition tells the compiler where and how much storage to create for the variable. A variable definition specifies a data type and contains a list of one or more variables of that type. There are two types of variable declarations, explicitly typed variables and implicitly typed variables. Below is an example of an explicitly typed variable ...

Python Tuples

We can tuple just like we create a list, except that we use regular brackets instead of square brackets. If we create a tuple with a single item, we need to include a comma at the end, otherwise we'll end up with a string. Tuples can hold different data types including lists so we can have a tuple with an element being a list. We access the values in a tuple by using the variable name with an index value enclosed in square brackets. We can also pick a range of values by using two indices se ...