All posts by Michalina

01

Jun'21

Newspaper3k: Article scraping & curation | by Lucas Ou-Yang

Newspaper3k: Article scraping & curation by Lucas Ou-Yang Inspired by requests for its simplicity and powered by lxml for its speed: “Newspaper is an …

Read More

25

May'21

Improving Java’s Visibility Modifiers with ArchUnit | by Grzegorz Piwowarek

Improving Java’s Visibility Modifiers with ArchUnit by Grzegorz Piwowarek Encapsulation and separation of internal components from public ones is probably …

Read More

17

May'21

Detecting Ransomware Precursors | by Andrew Skatoff

Detecting Ransomware Precursors by Andrew Skatoff The business model for Ransomware has evolved to include multi-level and multi-stage services and …

Read More

10

May'21

ARTIFACTS OF GOOGLE DRIVE USAGE IN WINDOWS | by Joseph Moronwi

ARTIFACTS OF GOOGLE DRIVE USAGE IN WINDOWS by Joseph Moronwi Google drive is an online file storage and sharing service …

Read More

04

May'21

The Octopus Scanner Malware: Attacking the open source supply chain | by Alvaro Munoz

The Octopus Scanner Malware: Attacking the open source supply chain by Alvaro Munoz Securing the open source supply chain is …

Read More

27

Apr'21

Joker malware infects over 500,000 Huawei Android devices | by Ionut Ilascu

Joker malware infects over 500,000 Huawei Android devices by Ionut Ilascu More than 500,000 Huawei users have downloaded from the …

Read More

19

Apr'21

A new wormable Android Malware Spreads by auto-replying to WhatsApp messages | by Alfiya Shaikh

A new wormable Android Malware Spreads by auto-replying to WhatsApp messages by Alfiya Shaikh Overview Check Point Research (CPR) recently …

Read More

13

Apr'21

The Facebook data dump: privacy lessons for users in Ireland | by Maciej Makowski

The Facebook data dump: privacy lessons for users in Ireland  by Maciej Makowski For anybody who has even the slightest …

Read More

06

Apr'21

Mobile forensics | by Dr. D.K. Sharma and Ishita Gupta

Mobile forensics by dr D.K. Sharma and Ishita Gupta Forensic science is heavily reliant on police forces as these are …

Read More

30

Mar'21

Automation of the reconnaissance phase during Web Application Penetration Testing I | by Karol Mazurek

Automation of the reconnaissance phase during Web Application Penetration Testing I by Karol Mazurek There are many things that every …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013