News

IntroductionAPT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima) is a North Korean-aligned threat actor active since at least 2012. APT37 primarily targets South Korean individuals ...
In part one we started hacking Bluetooth and made a little £2 key-finder beep using only Android and Linux. If you haven’t ...
The concept originates from mathematician George Boole, who in the 19th century developed an algebraic system of logic using only two values: true and false. In computer science, this binary way of ...
KU Presents! is back in 2025-26 with a new director, a new website and an exciting lineup that combines quality with both ...
This is just a simple encryption algorithms that can be cool when it comes to understanding and exploring how does encryption works, but not seriously used to handle security on real life ...
File Encryptor This is a simple program I made in Python that allows you to encrypt or decrypt your files using AES-128 symmetrical encryption. This is one of the most secure types of encryption and ...
Laptops, external drives, and USB sticks are especially vulnerable to data theft, but with Windows and a few tools, you can ...