Privacy: Popular ai.type keyboard leaks personal details of 31 million users

Full Article : BetaNews – Third-party Android and iOS keyboard ai-type is at the center of something of a privacy nightmare after a misconfigured database leaked the personal details of more than 31 million … Read more

WebGoat Teaches You To Fix Web Application Flaws In Real-time

Full Article : OSTechNix – Good day, web developers! Today, we are going to discuss about a super useful application that teaches you web application security lessons. Say hello to WebGoat, a deliberately insecure … Read more

Privacy: Google updates Safe Browsing rules so apps must warn when they collect personal data

Full Article : BetaNews – Google is introducing changes to its Safe Browsing policies, requiring Android apps to display their own privacy warning if they collect users’ personal data. The company says that if … Read more

Want to switch from Apple macOS to Linux because of the ‘root’ security bug? Give deepin 15.5 a try!

Full Article : BetaNews – Apple’s macOS is a great operating system. Not only is it stable and beautifully designed, but it very secure too. Well, usually it is. Unless you live under a … Read more

How to Check Integrity of File and Directory Using “AIDE” in Linux

Full Article : Tecmint – In our mega guide to hardening and securing CentOS 7, under the section “protect system internally”, one of the useful security tools we listed for internal system protection against … Read more

Security: macOS High Sierra bug lets you log in as ‘root’… without a password

Full Article : BetaNews – If you thought that you needed a password to access a password-protected Mac, think again. A massive security hole has been discovered in macOS High Sierra that makes it … Read more

How To Protect Server Against Brute Force Attacks With Fail2ban On Linux

Full Article : 2daygeek – One of the important task for Linux administrator is to protect server against illegitimate attack or access. By default Linux system comes with well-configured firewall such as Iptables, Uncomplicated … Read more