Posts

'Supply Chain Attack' on 35 Big Companies including Microsoft, Apple, PayPal

Image
'Supply Chain Attack' on 35 Big Companies including Microsoft, Apple, PayPal An ethical hacker (researcher) has recently demonstrated a novel supply chain attack. Accordingly, the systems of more than 35 big technology companies like Microsoft, Apple, PayPal, Sophie, Netflix, Tesla, Uber have been breached. Novell Supply Chain Attack exploits public and open-source developer tools. The system, developed by ethical hacker and cybersecurity researcher Alex Birsan, injects malicious code into an open-source developer tool to exploit the dependencies of those organizations' internal applications. It could target developers' projects using public depositories such as GitHub. According to Birsan, the success rate of such attacks is high after the companies have been targeted. The vulnerabilities he has exploited so far, which he calls 'Dependency Confusion', have been found in more than 35 organizations. These were in Python, Ruby, and Java programming languages.

Online data of all Brazilian citizens leaked

Image
Online data of all Brazilian citizens leaked Data on all Brazilian citizens have been leaked online. The Brazilian Consumer Protection Agency has instructed the government to immediately protect citizens' data. The institute has also directed to take necessary steps for data security immediately. The data leak occurred last week, with data on 223 million Brazilians leaked. In a country with a total population of 221 million, the question of how 223 million data can be leaked may arise in your mind. It is also mentioned that there is information about the person who died earlier in the incident. Besides, data of 104 million vehicles in the incident has also been made public. The data thus made public includes the name of the person, identity card number, marital status, name of the father, mother, and son, and daughter, complete information of the house, credit score, voter registration number, profession, and other details. The person's LinkedIn profile has also been leaked. It

Starting coding? Find out about Python

Image
Starting coding? Find out about Python Python is now a popular programming language, used across a wide range of artificial intelligence. In this age of digital transformation, the demand for manpower capable of designing applications is high. So today we are going to tell you about the important information needed for those who want to make a career from Python language such as salary, programming application, courses to be studied, developer's feelings. Python: Always popular TIOBE publishes its top popular programming languages ​​each month. It updates the ranking of long-trending languages ​​in the evolving landscape of programming languages. According to TIOBE's January rankings, Python was the top popular programming language of the year. This is the fourth time Python has received such an honor. In 2020, Python achieved a rate of 2.01 percent, compared to 1.99 percent and 1.66 percent of the other popular programming languages ​​C ++ and C, respectively. In TIOBE's F

Here's how to put one together for use with a quantum computer

Image
Here's how to put one together for use with a quantum computer Many of you may have heard of supercomputers. But have you ever heard of a quantum computer? If some have heard this word somewhere then you are lucky. Because you have the good fortune to listen to the modern technology of the modern age. Today we will tell you what a quantum computer is and how it works. To understand a quantum computer, first remove all the elements inside the computer such as a keyboard, mouse, motherboard, hard drive, RAM, graphics card. And look at the things that have helped make your computer a computer. Whether it's a computer or a mobile phone, the processor is what makes your device so smart today. The smallest element in that processor is the transistor, whose particles combine to form a single processor. The transistor acts as a switch to turn the current on and off. There are billions upon billions of such switches inside a computer. Once you get all those switches, you can perform all

What is quantum internet and how is data transferred from it?

Image
What is quantum internet and how is data transferred from it? Quantum Internet begins where the capacity of our normal computer or Internet is limited. For example, today's computers have a processor based on seven-nanometer lithography. After a while, it decreases to five, three to two. Then it is difficult to reduce the size. Because the size of the transistor inside the processor is about the size of an atom. Then our internet is transferred to the quantum world. Where our normal physics don't work. Quantum computers are born to meet the limitations of ordinary computers. It has high cybersecurity. Because it is transferred to the superposition. With the advent of a quantum internet, you don't have to use encryption like you do now. The speed of quantum internet is much faster than the normal internet we use. According to scientists, its data transfer rate is one GB per second. Quantum Internet was discovered by Chinese scientists. When two places with a distance of 40 k

Facebook is bringing a smartwatch under its own brand to challenge Apple

Image
Facebook is bringing a smartwatch under its own brand to challenge Apple Social media giant Facebook is going to bring a smartwatch. The information company has written the news saying that the company is going to bring a smartwatch with health and massage features. The company has not yet named the product. But it will support Google's Android operating system. As Facebook develops its own operating system, Google will no longer have to rely on second-generation smartwatches. Meanwhile, many may be interested in what the smartwatch that Facebook will bring. According to sources, the service of this smartwatch will be integrated with the apps of the company including Facebook, Facebook Messenger, Instagram, and WhatsApp. It is also said to support cellular connectivity, which allows you to send and read messages without a smartphone. In addition to the messaging feature, the smartwatch will also include a fitness feature. For this, smartwatches will be connected with the hardware a

When a bug is found, the hacker earns about Rs 175 million

Image
When a bug is found, the hacker earns about Rs 175 million A white-hat hacker (cybersecurity researcher) has received the biggest bug bounty award ever. On February 3, Armor Fi paid a white-hat hacker named Alexander Slindwine 1.5 million, or about  175 million, for finding a sensitive bug in his smart contract. Alexander discovered the bug before going to the insurance brokerage platform Armor Fi Live. If the bug had been left unchecked, it would have allowed a bad character with a dollar coverage to steal the entire Armor Fi underwriting contract. The company has since provided 1 million armor tokens to Alexander. At the time of the announcement of the Bounty Reward, one million tokens were worth 700,000. But as news of the new bug bounty and security patch spread, public confidence in the platform increased, pushing the price of the token by 1.58. At the same time, the total value of Alexander's token has reached 1.5 million dollars. Which has made this bounty the biggest bounty