WP Live Chat Support – Vulnerability
The developers of the WP Live Chat Support plugin, which has more…
OWASP mobile top 10 security risks explained with real world examples
As mobile application developers we should be familiar with possible security risks…
A Critical Vulnerability has been discovered in the free nginx web server
The problem affects the latest versions of Nginx.Security expert Alice Esage Shevchenko…
How to quickly download audio and video from any sites
On the Internet, you can find many instructions for downloading media from…
How to reduce weigt without losing video quality
When a video file takes up too much space on your computer…
MitM and DoS attacks on domains through the use of residual certificates
HTTPS certificates are one of the pillars of Internet security. But it…
Mobile beasts and where to find them — part two
In the last installment of this story about mobile miscreants, we discussed…
SynAck ransomware: The doppelgängster
Malware tends to evolve, with crooks adding new functions and techniques to…
Hidden miners on Google Play
When a computer shows signs of slowing down, many tend to blame…
Defense of the Accounts 2: Tips on safe gaming
If you understand the title of this post, you are most likely…