Aug 10, 2020 | Articles
Reverse engineering involves dissecting objects, both physical and digital, to comprehend their inner workings, enabling us to replicate, enhance, or secure them. We’ll explore essential tools such as Ghidra, Binary Ninja, Apktool, and Javasnoop, which empower engineers and security experts to unravel and optimize software.
Jul 13, 2020 | Articles
In this article, we’ll explore the increasing proliferation of IoT (Internet of Things) devices and the associated cyber threats. We’ll discuss underlying vulnerabilities in firmware, including hidden backdoors, unauthenticated access, weak authentication, and the challenges associated with securing update mechanisms.
Jun 18, 2020 | Articles, Malware
First steps to take after being infected with a Ransomware Post Views: 1,324 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 6 Minutes Early days, the first ransomware attack In 1989., an AIDS researcher initiated the first attack, which...
May 10, 2020 | Articles, Information Security
Data Privacy & Data Protection: Interconnected, yet one doesn’t secure your Data Post Views: 663 Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike. Reading Time: 4 Minutes Why data privacy and protection...
Apr 5, 2020 | Articles, Malware
Malware encompasses a wide range of software designed to inflict damage or gain unauthorized access to computers and networks. Today’s malware landscape has evolved into a complex web of threats that target personal and corporate systems.