In an Android Security Advisory issued on March 18th, Google revealed it was notified of at least one unidentified rooting app available in Google Play and third-party marketplaces using a local elevation of privilege vulnerability in the Linux kernel of Android devices. This Android vulnerability advisory was published just before …
Read More »FBI hacked iPhone and wont disclose details
FBI successfully hacked iPhone and they wont disclose how it got data from seized San Bernardino shooters iPhone. The iPhone has been at the center of a bitter dispute between Apple and the Federal Bureau of Investigation. But that legal battle—in which a judge last month had ordered Apple to …
Read More »Handy MySQL Commands
I’ve compiled a list of handy MySQL commands that I use very frequently in a headless server. I am not a MySQL guru, so I decided to braindump everything in here. This covers random issues from WordPress slowness, Query Cache Modification, User Creation, Database dumping and importing, rsync’ing large files …
Read More »US Government Firewall Einstein fails to protect Govt agencies from massive data breach
Two weeks back there was a crippling cyber attack to hit US Office of Personnel Management that breached US Government Firewall. It’s the agency responsible for managing the personnel records and security clearance details for millions of current and past US government employees. US government alleged breach enabled attackers to make …
Read More »Social engineering Amazon Customer Service
Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional “con” in that it is often one of many …
Read More »