Ransomware – Mechanisms and Protection
Learn about the current state of ransomware and what techniques can be used to detect zero-day ransomware attacks
Learn about the current state of ransomware and what techniques can be used to detect zero-day ransomware attacks
This article covers virus detection system testing and is written for quality assurance specialists with no experience in testing malware detection sy...
Learn about zero-day attacks and zero-day exploits, including four main techniques used in detecting and preventing them.
An overview of main mobile information security issues, with some suggestions on how to deal with them
A sample Android app implementing Android KeyStore and its alternatives for previous versions
The method of accessing third-party app private data like skype messages on Android - with sample code
Get a brief overview of the 3 most widespread web app vulnerabilities: security Misconfiguration; broken session and authentication problems; and Cros...
This article includes description of simple unhooker that restores original System Service Table hooked by unknown rootkits, which hide some services...
Article describes a small tool (sources included) to get various data on applications installed on Android device
This article describes a way to create Android applications which cannot be removed or stopped by users; only admin who knows a special password can d...
Tell us about
your project
...And our team will:
Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.