Webinjects 101
It’s not uncommon for malware to use a technique known as formgrabbing; this is done…
Automatic Transfer Systems (ATS)
ATS is one of the newer techniques employed by banking malware that not many people are…
Creating a Simple Free Malware Analysis Environment
Computer Requirements: A CPU with AMD-V or Intel VT-x support (pretty much any modern CPU).4…
Understanding Facebook Libra Crypto-currency.
For sometime, here at cod.e have been trying get to understand the new crypto-currency by…
Apple, Amazon, Google, Microsoft and Mozilla release patches for ZombieLoad chip flaws
Big tech is stepping in to patch newly disclosed security flaws affecting almost every Intel chip since…
New Flaw in Intel Chips; ZombieLoad steals your sensitive data
Watch out! Your processor resurrects your private browsing-history and other sensitive data. After Meltdown, Spectre, and Foreshadow, we…
Hackers Broke Whatsapp with just a phone call!
YOU'VE HEARD THE advice a million times. Don't click links in suspicious emails or texts. Don't download shady apps.…
You need to pay attention to cyber security
More firms say they prioritize cyber-security, but a significant number are still putting themselves at…