How malware gets into mobile applicationsĀ 

Malicious software on popular mobile platforms such as iOS and Android is at best a nuisance and at worst a security threat to individuals and businesses. Known as malware, some perpetrators use it to infect apps and get inside your smartphone. Why do they do it? Money, mostly. The recent Judy malware, for example, was reportedly… Continue reading How malware gets into mobile applicationsĀ 

Neural network which transforms graphic designs into functioning code

The gap between graphic designers andcoders just got smaller. Until now, if you wanted to build a graphic user interface,whether for app design or custom websites, you would have to enlist a developer to turn yourideas into code. But designers could soon take this power into their own hands. Copenhagen-based startupUlzard Technologieshas developed an app,… Continue reading Neural network which transforms graphic designs into functioning code

Wannacry : Detailed Analysis ( part 1 of 3 )

Main Launcher: The Killswitch effect The main launcher has a curious feature, where, before it does anything else, it checks connectivity to a certain domain. Ifthat domain resolves, the binary exits and does nothing further. This has been dubbed the killswitch. The killswitch domains below that have been found so far have been registered by… Continue reading Wannacry : Detailed Analysis ( part 1 of 3 )