
Understand EVM bytecode – Part 4
In previous section:Understand EVM bytecode – Part 1Understand EVM bytecode – Part 2Understand EVM bytecode – Part 3We have talked about how different Solidity data types ...
A collection of 41 posts
In previous section:Understand EVM bytecode – Part 1Understand EVM bytecode – Part 2Understand EVM bytecode – Part 3We have talked about how different Solidity data types ...
In previous sections:Understand EVM bytecode – Part 1Understand EVM bytecode – Part 2We have talked about creation and runtime parts of the EVM bytecode. We ...
In the first section,Understand EVM bytecode – Part 1We have inspected the contract creation part of the EVM bytecode of the smart contract. In ...
If you have started reading this article, I guess you already know what EVM stands for. So I wouldn’t spend too much time ...
Trustlook Labs has identified a malicious app which is most likely using social engineering attacks to trick users to install it. The app (MD5: ...
Are you worried Android apps are secretly recording what you say or what you do? A new study from computer science researchers at Northeastern ...
Trustlook Labs has discovered a Trojan which obfuscates its configuration file and part of its modules. The purpose of the content/file obfuscation is ...
Tencent Security Labs recently reported a vulnerability that exists across some common apps. The report can be found at http://www.cnvd.org.cn/ ...
Trustlook labs has discovered a Trojan which targets Korean speaking mobile users. The Trojan collects user data, including contacts, call logs, and SMS history. ...
Trojan spyware can eavesdrop on a user’s device to secretly steal information. There are commercial spyware apps that market themselves as benign parental ...
Trustlook Labs has investigated a ransomware outbreak dubbed “BadRabbit,” which is sweeping public organizations and businesses such as airports, banks and power utilities in ...
A Trojan disguised as a keyboard app performs various operations on a user’s deviceTrustlook Labs discovered a Trojan taking advantage of the “su” ...