- What is Man-in-the-Disk Attack?

if you are an android user, you should know about the man-in-the-disk attack and the dangers it brings. this vulnerability allows intruders to take control of legitimate apps on your android device and use them to introduce malicious apps.
- After WannaCry, Petya's 'extortion' malicious code is raging, this is a remedy to prevent

the 'blackmail' malicious code called petya, which appeared under the new version of petrraprap, is similar in effect to the wannacry malicious code, causing the computer system of many multinational companies to be shattered. according to the initial record, these first countries infected with malicious code include ukraine, russia, britain and india.
- Warning: The number of malicious emails is increasing rapidly on Gmail and recommendations from Google

google said it successfully blocked millions of covid-19-related emails on gmail every day, continuously for more than a week, and issued warnings and recommendations to use to protect themselves against love. escalating network attack pattern.
- The Wormhole attack in wireless sensor networks

the wormhole attack is a type of network layer attack that is performed using multiple malicious nodes. the nodes used to perform this attack are superior to the normal ones and have the ability to establish better communication channels over long ranges.
- NASA 'headache' trying to find a way to bring samples from Mars back to Earth

nasa has big goals for mars. the agency wants to collect the first samples from the martian surface and return them to earth in an ambitious mission called mars sample return.
- Steps to protect email against malicious threats

the following ways seem to be very simple and popular, to the extent that 'everyone knows and of course', but not everyone seriously takes it to stay away from any risk of fraud or malicious code attacks.
- Ransomware LockerGoga is making a big corporation miserable

norsk hydro - one of the world's largest aluminum and renewable energy corporations based in oslo, norway, was forced to suspend most of its production lines and switch to manual operation. part of a network attack is said to be related to lockergoga malicious code.
- New malware using web application has turned into a source of attack, very difficult to detect

recently, researchers from talos (microsoft) and cisco have discovered a new type of malicious code that is very complex and has an extremely fast spreading speed.
- How does malicious code break into user PC (Part 2)

the previous article detailed how aggressive hackers infect malicious code and can see that these are extremely dangerous attack techniques.
- Warning: Detected malicious code hidden in the graphics card's VRAM

one of the aspects that make cybercriminals dangerous lies in the initiative they take in deploying new forms of malicious attacks.