Reverse-engineering

Google Cast is a proprietary protocol by Google which enables controlling playback of Internet-streamed audiovisual content on the Chromecast, Android TV and other compatible devices. From the consumer perspective, Google Cast connects two devices: a sender (i.e a smartphone) and a receiver (such as a Chromecast). Using the Google CastRead More →

monero

There’s a good chance everyone who reads this story will have had some degree of interaction with a botnet we call MyKings (others call DarkCloud or Smominru), whether you know it or not. For the past couple of years, this botnet has been a persistent source of nuisance-grade opportunistic attacksRead More →

ltc

How much computing power as well as money is required to carry out a 51% attack on a blockchain like that of Litecoin which uses PoW as its protocol? Blockchains using the PoW consent protocol (Proof of Work) use the computing power of machines to secure data and the network that hasRead More →

crypto

Threat researchers have newly discovered malicious code in WAV audio files, code that hackers use to mine cryptocurrencies. Hackers earn thousand of dollars per month. On Oct. 19, researchers at BlackBerry Cylance, a software company that develops antivirus programs, reported the discovery of malicious code hidden within WAV audio files. ThisRead More →