All Articles - Page 8

Started to be written in 2017, SerHack Blog represents a solid but unique point of view in Computer Science field. From cryptocurrencies to information security, from reverse engineering to phishing: many topics are depicted using layman terms. What are you waiting for? Read one of any articles.

Olivetti 0.112.6 for SerHack

Introduction to MoneroV and its Inherent Risks

– The “MoneroV” coin is an impending unofficial fork of the Monero blockchain with many “red flag” characteristics that have alarmed the Monero community. Many users are wondering: could the MoneroV fork be a scam project? This article discusses risks for individuals claiming MoneroV, and describes … See Full Article

Introduction to MoneroV and its Inherent Risks Illustration

How to Crash the iPhone with a Single Telugu Character

– In recent years, Apple has been heavily criticized for the security implications of their market centralization and policy of irreversible operating system updates. Mobile device users are strongly pressured to install packaged iOS upgrades that cannot be rolled back. While this practice greatly … See Full Article

How to Crash the iPhone with a Single Telugu Character Illustration

How I broke Envato Search Engine

– How Envato managed two critical vulnerabilities discovered by me TLDR; Envato devs had not developed a strong filter in order to avoid any XSS Attack, and I noticed that I could perform a XSS Injection. I have contacted Envato and, after some investigations, they have discovered that my … See Full Article

How I broke Envato Search Engine Illustration

Developing a Keylogger: Hardware vs. Software Techniques

– To celebrate 400+ visits to my blog after just 10 days (not bad, come on), I managed in my spare time to write another, very interesting article on another popular category of malware: keyloggers. Keyloggers are a particularly insidious form of malware: they are software designed to monitor every … See Full Article

Developing a Keylogger: Hardware vs. Software Techniques Illustration

Technical Analysis of WannaCry Ransomware

– By now, on the net, on TV and around the world, there is nothing but talk about WannaCrypt: ransomware, or malware that can encrypt all the files on one’s computer and demand a ransom for unlocking them. It has infected between 500,000 and 600,000 computers in more than half the world. … See Full Article

Technical Analysis of WannaCry Ransomware Illustration
All tags