Q1. Why was this post written? To define Malwares and demonstrate the differences between Viruses, Trojans and Spams. Also, We will talk a bit about hacks and cracks. Q2. What are Malwares? Malware is a malicious, invisible and harmful piece of software like viruses,...
“Everything is vulnerable” is a series of posts about computer vulnerabilities, malwares, hacking and security. There is one fact to Illustrate and one goal to reach. The fact : Everything is vulnerable. The goal : Everything can be secured ! This series contains a...
This vulnerability allows sending malicious files to a 3rd party using Microsoft AFKAR ( Arabic word for ideas ) service.. Proof of concept 1- Use a binary code or interpretted code for ‘callback’ parameter value ( Like the python code used in the example...
Recently, I started to hate the way Facebook shows activity of the world all over the place. Whether through the home page or the silly ticker! I’ve implemented a small extension to remove parts that I don’t like. In my case I removed Ads, ticker, home...
I can’t upload this vulnerability video as It contains sensitive data about AT&T server. ( Local paths, Linux usernames, etc ) Vulnerability details. Vulnerability detection. AT&T are using Apache Solr for ajax searching in help files querying. Apache...