HOT HEADhothead01th.hashnode.dev·Nov 2, 2024Understanding the Malicious Use of OAuth ApplicationsThe Comprehensive Guide to Malicious Use of OAuth Applications: Understanding Parameters, Charts, and Case Studies OAuth (Open Authorization) is essential in today's interconnected digital landscape, facilitating secure access to user data across var...malicious
Vardan Hakobyanvardan.hashnode.dev·Sep 26, 2024Job Scams: How Developers Are Tricked into Running Data-Stealing Code, and How to Spot ItPhoto by Ariel on Unsplash I recently shared a story about a scam job posting on Codementor where the goal was to trick developers into running malicious code on their machines. Fortunately, I discovered the issue before executing the code, and the a...Freelancing
Vardan Hakobyanvardan.hashnode.dev·Sep 19, 2024Beware of Malicious Code: A Developer’s Experience with a Suspicious RequestPhoto by FlyD on Unsplash I’ve been doing mentoring and freelancing on Codementor for a while now. Recently, I applied for a project titled “Front-end Design Developer (React.js, Three.js)”. The client asked me to install their code locally and “fix ...hacking
BrowserScanbrowserscan.hashnode.dev·Jun 13, 2024What Is a Bot and How Does It Work?Bots, or internet robots, are software applications designed to perform tasks automatically, often replacing human effort. They follow instructions from their creators to handle tasks ranging from data scraping and customer service to managing routin...bots
Derek Onwudiwetecheffect.hashnode.dev·May 26, 2023Vishing and Smishing SaviorIn a Nkwonabo City, Nkwonabo, there lived a young girl named Ngozi. She was a smart and observant twelve-year-old with a heart full of kindness and a mind brimming with curiosity. Ngozi had always been fascinated by technology and had a keen interest...55 readsVishing
Kuldeep Singhkusingh.hashnode.dev·May 22, 2023Beware of VSCode: The Rise of Malicious ExtensionsWhether you're a seasoned developer or new to the world of coding, Visual Studio Code (VSCode) has likely become a part of your daily routine. However, as with any widely-used platform, it isn't immune to the threats posed by cybercriminals. A recent...1 like·59 reads#cybersecurity
Derek Onwudiwetecheffect.hashnode.dev·May 17, 2023Hacking a Bluetooth DeviceBluetooth devices can be vulnerable to hacking, although the level of risk can vary depending on the specific device and its security measures. Bluetooth technology allows wireless communication between devices over short distances, and while it offe...bluetooth