Cryptography

Entries with this tag cover techniques and practices to secure information and communication, especially encryption, the process of encoding digital data.

Photo by Jelleke Vanooteghem on Unsplash

Felipe Ruiz


Benefits and risks of these increasingly used programs

We describe the password managers, their advantages and disadvantages, some recent security incidents, and give you some recommendations on their use.

Photo by Billy Huynh on Unsplash

Felipe Ruiz


NIST chose four algorithms, and four others are pending

NIST chose the first four quantum-resistant cryptography algorithms. Here you'll learn about it with an intro to public key cryptography and quantum computing.

Photo by Icons8 Team on Unsplash

Felipe Ruiz


Find out about LockBit, now in its menacing 2.0 version

In this post, you'll learn in general terms what LockBit ransomware is, what its characteristics are and why it can pose a significant threat to your business.

Photo by Elisabeth Pieringer on Unsplash

Felipe Zárate


Tips for understanding the Apple–China controversy

In this post, we will understand why the Apple data center inaugurated in Guizhou reopened the controversy over data privacy in China.

Photo by Guido Hofmann on Unsplash

Felipe Ruiz


The first ransomware (as a gift) for this new year

Here's a post dedicated to the new form of ransomware, Babuk Locker. I mention its encryption scheme, its injection, operation, and other basic things about it.

Photo by Sharon McCutcheon on Unsplash

Felipe Ruiz


Some pieces of information about ransomware attacks

Everyone could be a target for ransomware attacks. Here we give an introduction to this topic and tips that could help you prevent being a victim.

Photo by Arteum.ro on Unsplash

Felipe Ruiz


A very short introduction to password cracking

After I wrote this post, I decided to change some of my most important passwords, and after you read it, we think you might want to modify your passwords too.

Turned on Android smartphone. Photo by Pathum Danthanarayana on Unsplash: https://unsplash.com/photos/t8TOMKe6xZU

Jonathan Armas


Intercept applications in newer Android phones

Android is one of the most suitable targets for hackers. Here we show how to intercept Android apps' web traffic by installing a self-signed certificate.

Photo by Aurélien Clément Ducret on Unsplash

Julian Arango


A chat with Andrés Gómez

For this post, we spoke with Andrés Gómez, a former Fluid Attacks' member, who is researching to protect a computer grid supporting experiments at the LHC.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.