On 30th September 2020,GitHub launched the “Code Scanning Tool” which will definitely give immense support in finding out security vulnerabilities prior to the production phase of the application. Even though the tool was available for GitHub Beta Users since May now it is available for both paid and free account holding users.  Last year, they introduced Semmle. Which is a table turning semantic code analysis platform. It gave the thumbs up to the developers to go ahead and create queries which have the ability to analyze code patterns in huge code databases and identify vulnerabilities. This year GitHub is introducing a Code scanning Tool.  According to GitHub this feature is able to identify the vulnerabilities of the code as soon as it is created. Every single pull request, merge commits and commits are thoroughly analyzed within seconds. This feature is strengthened by CodeQL which is considered as the world’s number…

Read more

A team of researchers with Google’s AI Quantum team (working with unspecified collaborators) has conducted the largest chemical simulation on a quantum computer to date. The research team believe it was a step forward in quantum computing. Xiao Yuan of Stanford University who is an expertise in AI Computing has written a Perspective piece outlining the potential benefits of the quantum computer used to conduct chemical simulations and the work by the team at AI Quantum. Developing an ability to predict chemical processes by simulating them on computers would be of great benefit to chemists—currently, they do most of it through trial and error. The prediction would open up the door to the development of a wide range of new materials with still unknown properties. Sadly, current computers lack the exponential scaling that would be required for such work. Because of that, chemists have been hoping quantum computers will one day step in to…

Read more

Introduction Mobile malware is malicious software that targets mobile phones or PDA, by revealing confidential information of the users without their concern. As these devices have become widely used, malicious and electronic attacks are also increasing in a daily manner. Cybercriminals use various types of tactics to infect mobile devices. These are the common types of mobile malware : Remote Access Tool Bank trojans Ransomware Cryptomining Malware Advertising Click Fraud Out of this “Joker malware” is also a type of Mobile malware. What is Joker malware Joker virus is a kind of  trojan that is capable of stealing your personal data. Once this malware is into your device it will keep monitoring  your device without your permission. This malware mainly focuses on money related data theft, such as bank details, account history, sms, otp and etc. From bank account details and the otp sent to your sms the hacker can…

Read more

A denial of service (DoS) attack is an attack designed to shut down a computer or network, making it inaccessible to intended users. Dos is an attack used to deny legitimate users access to resources such as websites, networks, email, etc., or to perform very slowly. This type of attack is usually carried out by hitting a target resource, such as a web server, with too many requests at the same time. This results in the server not responding to all requests. This can result in servers crashing or slowing down. There are two types of Dos attacks:  DoS–  performed by a single host Distributed DoS–  performed by several compromised machines that all target the same victim. It floods the network with data packets. Common types of attacks Smurf This type of attack uses large amounts of Internet Control Message Protocol (ICMP) ping traffic that targets a broadcast address on…

Read more

With this COVID-19 situation, most of us had to start working from home and learn from home to maintain the public distance which has been forced by most of the countries in the world. So, with this issue, many alternatives have become very popular in society. Among all of them, Zoom has become one of the most popular and efficient methods of holding meetings, having group chats and for school students and university undergraduates a source to hold their online lectures as well. Most of us have been forced by our workplaces or schools or universities to use Zoom applications rather than the want we have to use it. What has been the demand for Zoom recently & the reasons?  According to the Videoconferencing software company Zoom, it states that more uses have been adapted to the system compared to 2019 due to the Covid-19 epidemic situation. Since February 2020…

Read more

During the past few years AWS, Azure and Google have made a big impact on Cloud Computing. From 2015 to June of 2019 statistics at Statista.com[6] shows us how their market revenue has increased. The major problem security professionals face today is that across almost all the cloud solution platforms are equipped with different security protocols or security models. Sometimes these security models are poorly documented or totally incompatible with current operating systems. Usually, you can’t learn these frameworks within a couple of weeks. It takes years and years to get sufficient hands-on experience to genuinely reach to the bigger picture of security measures in a cloud solution provider. Here I have gathered a very concise and brief description about simple and a high-level comparison to present you a clear idea about the differences. Amazon Web Services When it comes to cloud services AWS is the oldest and more seasoned…

Read more

Data plays an increasingly important role in our personal lives, economic stability, and security. Just as we protect our valuable property in the physical world, it is equally vital to keep our important data security. Digital security is becoming more and more critical as we shop online, communicate, or engage in transactions. As our lives move rapidly in the digital world, everyone should be doing more to strengthen digital data security. Our digital world is always a prominent target for cybercriminals. According to statistics, at least 423 million identities have been exposed by data breaches in the year 2015 which is expected to increase by more than 20 percent in just one year.  As it has become critical to safeguard our information from cyber criminals, we have been relying on encryption for quite some time. Encryption is a part of nearly every service or device we use when living in…

Read more

Introduction – What is Firebase? Firebase is a set of tools to build, improve, and grow your app. This will cover a large portion of services that developers would normally want to develop themselves. The services are hosted in the cloud and scale with little to no effort on the part of the developer. When it comes to “hosted in the cloud”, it means that the products have backend components that are fully maintained and operated by Google. Usually, traditional app development needs both frontend and backend development. But in firebase products, the backend development is bypassed. This helps the developers to develop dynamic and scalable apps quickly. It invalidates most of the hassle of creating and managing infrastructure. Simply we can that it is a cloud database. What are firebase security rules? On firebase, a client can connect to any firebase they want. Therefore, your data can be misused…

Read more

As soon as websites exceed the size of a typical private homepage, there are a number of new challenges that arise. One is that the current content is as fully up-to-date as possible in the Google Index. Whilst this may sound simple, large sites are prone to making serious errors, as their content comes from a large number of different sources and is spread through many repositories. Even for Google, the tools available to capture and store website contents are minimal. This makes it possible for Google to use individual limitations per domain: how many URLs are creeping into the Google index per day? Extensive websites can quickly run into these limitations. Due to this, it is important to use the available resources as intelligently and productively as possible. In this article, I want to give you some background information on the topic google crawling and indexing. Google Crawling Crawling…

Read more

Natural selection has created many species in which individual survival rests on computations performed by the organism’s own physiology. When can a physical system be said to perform a computation? However, physical computing is more interesting in the narrower domain in which a set of physical variables represents the values of another set of mathematical ones. A physical variable might be a voltage within a digital computer, the height of a stack of poker chips, or a chemical concentration in a biological cell. These variables are then dynamically transformed by physical processes, in a way that represents algorithmic manipulation of the mathematical variables. For physical computing systems that are also biological, it is often fruitful to view the organism as the ‘user’ of the computation. Natural selection has created many species in which individual survival rests on effective, often remarkable, computations performed by the organism’s own physiology.  For example, many…

Read more

10/63