Webinjects 101

It’s not uncommon for malware to use a technique known as formgrabbing; this is done…

Formgrabbers 101

Introduction For a long time malware has targeted web data such as site logins. A…

Automatic Transfer Systems (ATS)

ATS is one of the newer techniques employed by banking malware that not many people are…

malware
Creating a Simple Free Malware Analysis Environment

Computer Requirements: A CPU with AMD-V or Intel VT-x support (pretty much any modern CPU).4…

facebook-libra
Understanding Facebook Libra Crypto-currency.

For sometime, here at cod.e have been trying get to understand the new crypto-currency by…

Huawei
Huawei and the 5G saga

Am sure, in the recent few days, weeks, y'all have heard or read about the…

zombiload exploit
Apple, Amazon, Google, Microsoft and Mozilla release patches for ZombieLoad chip flaws

Big tech is stepping in to patch newly disclosed security flaws affecting almost every Intel  chip since…

zombiload-intel-flaw
New Flaw in Intel Chips; ZombieLoad steals your sensitive data

Watch out! Your processor resurrects your private browsing-history and other sensitive data. After Meltdown, Spectre, and Foreshadow, we…

whatsapp hacked
Hackers Broke Whatsapp with just a phone call!

YOU'VE HEARD THE advice a million times. Don't click links in suspicious emails or texts. Don't download shady apps.…

You need to pay attention to cyber security

More firms say they prioritize cyber-security, but a significant number are still putting themselves at…