Single Sign on Solution to Protect Your Company Data Security

Security is enhanced through SSO in light of the fact that users are diminished of the various secret password trouble. Let be honest, users detest complex passwords; SSO Single Sign-on...

Dell’s new app brings mobile notifications to the desktop

I’ll be honest, Dell wasn’t at the top of our list of must-visit companies at this year’s CES, but the PC stalwart is actually showcasing...

The Android Arsenal – Gestures

A simple gesture detection library for android. USES Step 1. Add the JitPack repository to your build file Add it in your root build.gradle at the end of repositories: allprojects{ ...

Radar: [Xcode] Enabling Extension-safe API check changes generated ObjC-Header

Oct 03, 2017Normally you only need the “Allow app extension API only” for extension targets, to get warned if you are accessing API which is not available for extensions. I...

Android Building Image Filters like Instagram

Nowadays image filters are quite common in lot of android apps. Instagram is famous for its popular filters feature and probably the first app...

How to make a podcast transcript

I really enjoyed my chat with Saron on the CodeNewbie podcast, and wanted to circulate the content more widely. Audio is great, but text is more searchable and thus more...

Covert Channel through Abusing X.509 Digital Certificates

Security researchers from Fidelis identified a new method to establish a covert channel communication by abusing widely implemented X.509 public key certificates. Certificates remain as a critical component of secure...

Inviteflood- Tool Used to Perform DOS attack on VOIP Network

Inviteflood is a tool to perform SIP/SDP INVITE message flooding over UDP/IP to perform DOS Attack. This tool can be utilized to flood a target with INVITE Request Messages. As long the tool...

Bug Bounty Researchers Earn More than 2.7 times of a Software Engineer

The HackerOne, a leading Bug Bounty Platforms published a survey of top 1,698 Bug Bounty Researchers earns in an average of more than 2.7 times of an average software engineer...

The story behind Apple’s nasty HomeKit vulnerability

When Apple announced HomeKit in 2014 it stressed that "HomeKit was designed with privacy and security from the very beginning" so that "only your iPhone can open your...

LATEST NEWS

MUST READ