Coding for hacking.    The languages  every security researcher/ hacker must know

Hacking is usually meant to break a code. There are three sections of hacking ― Web Hacking, Exploit Writing & Reverse Engineering and each of it requires different programming language 1. Web Hacking Since most of the tech is build around world wide web, it is important to learn web hacking to be a good… Continue reading Coding for hacking.    The languages  every security researcher/ hacker must know

How malware gets into mobile applications 

Malicious software on popular mobile platforms such as iOS and Android is at best a nuisance and at worst a security threat to individuals and businesses. Known as malware, some perpetrators use it to infect apps and get inside your smartphone. Why do they do it? Money, mostly. The recent Judy malware, for example, was reportedly… Continue reading How malware gets into mobile applications 

Neural network which transforms graphic designs into functioning code

The gap between graphic designers andcoders just got smaller. Until now, if you wanted to build a graphic user interface,whether for app design or custom websites, you would have to enlist a developer to turn yourideas into code. But designers could soon take this power into their own hands. Copenhagen-based startupUlzard Technologieshas developed an app,… Continue reading Neural network which transforms graphic designs into functioning code

Wannacry : Detailed Analysis ( part 1 of 3 )

Main Launcher: The Killswitch effect The main launcher has a curious feature, where, before it does anything else, it checks connectivity to a certain domain. Ifthat domain resolves, the binary exits and does nothing further. This has been dubbed the killswitch. The killswitch domains below that have been found so far have been registered by… Continue reading Wannacry : Detailed Analysis ( part 1 of 3 )