Entries with this tag cover techniques and practices to secure information and communication, especially encryption, the process of encoding digital data.

Photo by engin akyurt on Unsplash

Felipe Ruiz

Outstanding incidents of this type of crime since 2011

Discover some of the most notorious crypto crimes to date, among which we present not only software cyberattacks but also tremendous scams.

Photo by Bastian Riccardi on Unsplash

Felipe Ruiz

Introduction to a trend of just over a decade ago

We share basic knowledge about cryptocurrency and related concepts, including crypto crime, a worrying issue that has gone hand in hand with that paradigm.

Photo by Jelleke Vanooteghem on Unsplash

Felipe Ruiz

Benefits and risks of these increasingly used programs

We describe the password managers, their advantages and disadvantages, some recent security incidents, and give you some recommendations on their use.

Photo by Billy Huynh on Unsplash

Felipe Ruiz

NIST chose four algorithms, and four others are pending

NIST chose the first four quantum-resistant cryptography algorithms. Here you'll learn about it with an intro to public key cryptography and quantum computing.

Photo by Icons8 Team on Unsplash

Felipe Ruiz

Find out about LockBit, now in its menacing 2.0 version

In this post, you'll learn in general terms what LockBit ransomware is, what its characteristics are and why it can pose a significant threat to your business.

Photo by Elisabeth Pieringer on Unsplash

Felipe Zárate

Tips for understanding the Apple–China controversy

In this post, we will understand why the Apple data center inaugurated in Guizhou reopened the controversy over data privacy in China.

Photo by Guido Hofmann on Unsplash

Felipe Ruiz

The first ransomware (as a gift) for this new year

Here's a post dedicated to the new form of ransomware, Babuk Locker. I mention its encryption scheme, its injection, operation, and other basic things about it.

Photo by Sharon McCutcheon on Unsplash

Felipe Ruiz

Some pieces of information about ransomware attacks

Everyone could be a target for ransomware attacks. Here we give an introduction to this topic and tips that could help you prevent being a victim.

Photo by on Unsplash

Felipe Ruiz

A very short introduction to password cracking

After I wrote this post, I decided to change some of my most important passwords, and after you read it, we think you might want to modify your passwords too.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.