
Anton
Security Research Leader
As part of the Apriorit team, I aim at providing firsthand insights on tech and business, focusing on the true value of technologies and concepts and discussing pros and cons of applying them in IT projects.
Reverse EngineeringCybersecurityQASecurity Testing
More articles from author

During reverse engineering, you can end up in a situation when the available tools don’t yet support the architecture you’re working with. In this...

Reversing is complex. Yet software developers often turn to reverse engineering when faced with a challenging task: enhancing software security, makin...

Internet of Things (IoT) devices are already a significant part of our day-to-day life, work environments, hospitals, government facilities, and vehic...

Microcontrollers have limited protection against cybersecurity threats and attacks. As a result, the security of Internet of Things (IoT) devices and ...

Modern IT products often have to handle various file formats. And while it’s quite easy to ensure compatibility with open file formats, making your ...

Today’s software solutions require continuous improvements. But what used to take weeks or even months can now be done with a couple lines of code, ...

Reliable and secure routers are key to the normal work of any organization. If these devices are poorly protected, they can expose corporate networks ...

The average luxury car contains more lines of code than the Boeing 787 Dreamliner, F-35 Joint Strike Fighter, and F-22 Raptor combined. This amount of...

Reverse engineering can help you accomplish some of the most challenging tasks: researching malware, analyzing intellectual property rights violations...