Author: John Wiley

John Wiley is a Cyber security Evangelist, Researcher, Author & Speaker. He is a Security Writer & Editor-in-Chief, Author of W-Se Web Security Council.

Google Search Queries and GOOGLE DORKS LIST 4500 +

Google is a terrible search engine that can not avoid its fundamental responsibility to crawl websites. All things considered, this is how Google works. It crawls on pages and when people enter similar inquiries, the results are shown on its list of things tab. Google uses Google bot (or’ creepy crawls’) to crawl website pages….

McAfee Antivirus Software Vulnerability Allows DLL Hijacking

An attacker can circumvent self-defense mechanisms and persistence through a loophole in McAfee’s antivirus software, security researchers from SafeBreach have discovered. The security flaw could be exploited by loading unsigned DLLs into multiple services operating under NT AUTHORITYSYSTEM. However, operations require admin privileges to the attacker. Many components of antivirus solutions run as a “NT…

How to Open Android Phone Exe Files

Many smartphone users in Android have that question if they are able to use Windows exe computer programs. Sadly, you can’t use it directly or download.exe files on Android OS. But, you can use software from third parties that will support you. The millions of dollar problem you need a.exe file to run on the…

Adobe Patches Project Flaw, Internet Services

Adobe’s Animate, Illustrator, Media Encoder and Bridge apps have fixed a total of 11 vulnerabilities. The company says that it is not aware of any attacks that exploit such vulnerabilities and that they are unlikely to be used for malicious purposes, based on the priority given to the defects–they have all earned priorities of 3….

Top 10 Web Search Engines

When we have to check on the Internet, our mind goes to Google or Bing by default. Obviously, our mind is so tuned, and we get the results we are looking for. But how often do we think the knowledge we really are searching for can be found on the deep web? The big search…

Current Buran-Based Ransomware Tempts Offenders with Discount Licenses

The ransomware strain of VegaLocker provides the basis for the new Ransomware-as – a-service Buran which takes competitors at discounted rates. Buran was initially discovered in May 2019, according to McAfee researchers Alexandre Mundo and Marc Rivero Lopez, and has now joined the ranks of other RaaS offerings including REVil and Phobos. The Buran operators…

Defining the Principle of Least Privilege (POLP)

The concept of the least privilege, or POLP, lies in the belief that any client, program or system should be granted only the minimal privilege to fulfill its function. For example, a new user who has been developed to pull information from a database does not need administrative privileges, whereas a programmer who updates existing…

AOL Mail vs.Yahoo Mail vs. Outlook.com vs. Gmail

If you’re fed up with your existing email service, or you’re looking to make a switch from a university address, there are a number of free email options to choose from. Gmail has led the field for years, but competitors like Yahoo Mail, Outlook.com (formerly Hotmail) and AOL Mail have revamped their designs and features […]

DHS Warnings for Critical Flaws in Medical Equipment

The Department of Homeland Security (DHS) warns that critical vulnerabilities affecting Medtronic Valleylab products that permit attackers to overwrite files and to execute remote software. A Cybersecurity & Infrastructure Security Agency (CISA) DHS advisory warns about three recently patched vulnerabilities that could enable attackers to install a non-root shell in Medtronic Valleylab FT10 and FX8…

Cyber Services of Accenture Launches for Industrial Companies

Accenture Giant Consulting announced Thursday the release of three cyber series aimed at helping industrial firms to execute their cyber attack response plan. One of the cyber sites in Houston, Texas is the petroleum and gas industry, enabling businesses to simulate and respond to cyber attacks that impact on mining, manufacturing, refining or retail. The…