Category Security
How To Install Firejail In Linux
WP Maintenance Plugin Vulnerable To CSRF & XSS
If you have installed the WP Maintenance plugin on your WordPress site or blog, this article is for you. Recently, the Wordfence team discovered a CSRF vulnerability in the WP Maintenance plugin used to put the website on maintenance mode…
Cyberattack on Elasticseach Databases turns DBs into Zombies/Botnets
Critical Vulnerability Found In Ad Inserter WordPress Plugin
Ad inserter is a popular plugin for WordPress users. With this plugin, site administrators can easily manage ads on their websites. On July 12, Wordfence team(Another popular security plugin for WordPress), discovered a vulnerability called RCE — Remote Code Execution…
UFW Firewall Configuration In Linux
When administering servers, one of the first things that must be configured to increase the security of them is to configure a Firewall, Luckily in Linux is included a default called Iptables but this firewall many see it a bit…
Understanding CSRF – Cross-Site Request Forgery
Security is a major concern when designing web apps. And I am not talking about DDOS protection, using a strong password or 2 step verification. I am talking about the biggest threat to a web app. It is known as…
Ubuntu Releases Security Patch For Meltdown
In another article, I have covered what is Meltdown and Spectre and told you how critical it is for us Linux users. The Linux had been fixed immediately after the two flaws were discovered. But the Ubuntu maintained kernel was…
Fix For Meltdown And Spectre
Everyone is talking about Meltdown and Spectre, the two security flaws found in Intel, AMD(less vulnerable) and ARM CPUs. Using the flaws attackers can read system memory which may have your passwords and other sensitive information. The worst part of…
Meltdown And Spectre CPU Flaws Put Computers, Laptops, Phones At Risk
Today Google security blog has posted about the two vulnerabilities that put virtually many computers, phones, laptops using Intel, AMD and ARM CPUs at risk. Using the two major flaws hackers can gain read access to the system memory that…