Skip to main content

Posts

Facebook's Libra Crypto Gets Ready to Launch in January as a Single Coin

Facebook’s libra cryptocurrency is reportedly preparing to launch with a single cryptocurrency, a scaled-down version of its original plan. The launch date for Facebook’s libra could be as early as January. Launch Date for Facebook’s Libra The cryptocurrency libra, proposed by social media giant Facebook, is reportedly preparing to launch as early as January next year. However, only a limited version of the libra cryptocurrency will launch at that time. According to the revised libra whitepaper, the Libra Association intended to initially launch with some of the currencies in the proposed libra basket, such as “librausd or ≋USD, libraeur or ≋EUR, libragbp or ≋GBP, librasgd or ≋SGD),” the association explained. However, the Financial Times reported Friday: The association would now initially just launch a single coin backed one-for-one by the dollar … The other currencies and the composite would be rolled out at a later point. The exact launch date for the libra crypto would depend on w...

Malware Operators Arrested for Running Services To Bypass Antivirus Software

Romanian police forces have arrested two individuals this week, for allegedly running two malware crypting services like CyberSeal and DataProtector to escape antivirus software detection. These services were purchased by quite 1560 criminals and used for crypting several different types of malware, including Remote Access Trojans, Information stealers, and Ransomware. The pair used the Cyberscan service also which allowed their clients to test their malware against antivirus tools. How do Criminals Bypass Antivirus Software? Generally, hackers bypass antivirus detection through the utilization of crypters that encrypt or hide the primary code in a piece of software, usually malware to pretend to be something harmless until it gets installed on the victim’s device. In this case, the services provided by these two suspects fall into a similar category and are offered for sale in the underground criminal market since 2010. Their clients paid between US$40 to US$300 for these crypting ser...

Google Task Mate 100% Working Invitation Referral Code – Activate Task Mate Account (Easy Steps)

  Valid and 100% Working Referral Code for Google Task Mate (Beta) Early Access/ Testers : Google India has Launched Task Mate App on 19 November 2020 for the Indian user where you can Earn Money by finding task nearby, complete task i.e. Photo Upload, Record Sentence, Translate Sentences, Check shop details, upload video, etc. As the Task Mate is available to users in Beta Early Access only and for that, you have to enter a valid Invitation Referral Code. Here, Our Website Group (WhatsApp, Telegram and Twitter) Group and Channel are providing valid Referral Codes. Task Mate Beta is currently only available through invitation. Please enter the invitation or referral code below. TaskMate App – Complete Task to Earn Money Article About Valid Invitation Code of Task Mate (Referral Code) Company Google India App Task Mate (Early Access) Version Beta (Early Access) Invitation/ Referral Code Required Validity of Code Only for 100 Users per Invitation Code Website http://www.google.com/ V...

GitHub Launches Code Scanning Tool to Find Security Vulnerabilities – Available for All Users

GitHub launches a new code scanning tool that helps developers to detect vulnerability before the application reaches production. The tool was announced initially in May at the GitHub Satellite conference, since that time it is available for GitHub beta testers. GitHub Code Scanning Tool Now the GitHub code scanning tool is  available  for all users and they can enable it to form a public repository. The new tool is the result of the acquisition of Semmle last year. Semmle is a code analysis platform that helps developers to write queries that identify code patterns in large codebases and search for vulnerabilities and their variants. GitHub said they “worked to bring the revolutionary code analysis capabilities of its  CodeQL  technology to GitHub users as a native capability.” Code scanning tool powered by powerful code analysis engine CodeQL technology to GitHub users as a native capability. The tool gets integrated with GitHub Actions—or your existing CI/CD envir...

Microsoft’s Windows XP operating system (and other versions) source code has been leaked online

  The source code for Microsoft’s Windows XP operating system (and other versions) has been leaked online!  Published as a torrent file on bulletin board website 4chan, the 43GB data dump is said to have been compiled over the course of the last few months by the leaker. The collection also includes source code for Windows 2000 and multiple versions of Windows CE, MS DOS, Windows Embedded and Windows NT - but all of which have a smaller modern install base than XP. The individual responsible for the leak also appears to bear Bill Gates a distinct grudge, dedicating a whole section of the torrent file to videos slandering the Microsoft founder.  The legitimacy of the leaked code has not yet been confirmed, but Microsoft has been made aware of the issue. Although support for Windows XP lapsed in 2014 - meaning the OS has not received security updates for a number of years - a surprising number of users remain loyal to the outdated operating system. As of last month, 1.26% o...

Google rolls out new automated threat detection tool

Google and its subsidiary Chronicle are rolling out new automated threat detection capabilities for its Google Cloud platform to help companies scale up security monitoring for their legacy systems. The product – called Chronicle Detect – has been in the works for some time and Google unveiled some details around certain components earlier this year at RSA, like a data fusion model to create timelines, a rules engine for common events and incorporated YARA malware threat behavior language. Often, log data or telemetry from a company’s older, off-the-shelf or internal applications aren’t set up to integrate with or port to modern threat detection and response platforms. That can make consistent, continuous security monitoring harder and create visibility gaps for huge chunks of enterprise. In a release, Sunil Potti, Google’s general manager and vice president of engineering, and Rick Caccia, head of marketing for Google’s Cloud Security team, said the new capabilities were designed to a...

WhatsApp Discloses 6 Bugs That Allows Attackers to Execute Code Remotely

WhatsApp disclosed 6 security bugs through their dedicated security advisory site that allows attackers to execute remote code. WhatsApp is a messaging app used by more than two billion users around the world. All the vulnerabilities are disclosed in dedicated security advisory site aimed to provide more transparent details about vulnerabilities for users and security professionals. “We take the security of our users very seriously and we provide industry-leading protection for our users around the world. Our security team at WhatsApp works with experts around the world to stay ahead of potential threats,” reads the blog post. 6 Security WhatsApp Bugs CVE-2020-1894 – A stack write overflow Bug in WhatsApp Business for Android CVE-2020-1891 -A user controlled parameter used in video call in WhatsApp for Android CVE-2020-1890 – A URL validation issue in WhatsApp for Android CVE-2020-1889 – security feature bypass issue in WhatsApp Desktop versions CVE-2020-1886 – A buffer overflow in Wha...