• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Author: Drobotun

Inside Magma: How the Russian GOST R 34.12-2015 block cipher works
Stuff

Inside Magma: How the Russian GOST R 34.12-2015 block cipher…

1 month ago23/08/2025Drobotun1610
In the previous installment of our “import-substitution misadventures,” we took a deep dive into the Kuznyechik (Grasshopper) block cipher defined in GOST 34.12–2015. Alongside Kuznyechik, the standard also specifies another cipher with a 64-bit block size called…
CONTINUE READING 🡒
How to Handle Malware: Complete Guide. Give it to your younger brother, let him do it himself!
Malware

How to Handle Malware: Complete Guide. Give it to your…

29.12.201517/04/2025Drobotun3800
Numerous times you used to help your friends and people when their PCs fell to onslaught of malware. So did we. But we got pretty sick and tired of all that and pulled out a trump card…
CONTINUE READING 🡒
The Children of CryptoLocker, Part 2. TeslaCrypt, TorLocker, TorrentLocker
Malware

The Children of CryptoLocker, Part 2. TeslaCrypt, TorLocker, TorrentLocker

15.12.201514/12/2015Drobotun3590
The first examples of malware that encrypts files and then demands money for decryption appeared a long time ago. Just remember Trojan.Xorist with its primitive encryption algorithm based on XOR, or Trojan.ArchiveLock written in PureBasic, which used…
CONTINUE READING 🡒
The Children of CryptoLocker, Part 1. Critroni, CryptoWall, DirCrypt
Malware

The Children of CryptoLocker, Part 1. Critroni, CryptoWall, DirCrypt

10.12.201514/12/2015Drobotun5520
The first examples of malware that encrypts files and then demands money for decryption appeared a long time ago. Just remember Trojan.Xorist with its primitive encryption algorithm based on XOR, or Trojan.ArchiveLock written in PureBasic, which used…
CONTINUE READING 🡒
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com