- November 3, 2022
- 10 min read
Modern web applications are nothing like what they used to be. The practically limitless bandwidth and indefinite storage space that cloud computing offers. The microservices that run circles around monolith architecture, breaking down layered apps into small independent components. The single-page apps that load most resources (including the primary DOM elements) once per app cycle
- November 1, 2022
- 10 min read
They say that he who rules the data rules the world. They also say that knowledge is power. Phrase it any way you want, one thing is certain – information is the hottest commodity these days. Have you ever wondered why most services these days, especially online, are technically free? That’s ‘cause we’re not the
- December 23, 2021
- 14 min read
Introduction Cybercrime today is a massive business. Predicted damages inflicted by it for the year 2021 are totaling 6 trillion USD globally (a quick reminder, a trillion is a million million – yes, that much). Putting things into perspective, in terms of earnings, cybercrime puts such giants as Tesla, Facebook, Microsoft, Apple, Amazon, and Walmart
- September 30, 2021
- 18 min read
The rapid development of new technologies has given businesses not only a competitive edge and a profitability boost but also a major cybersecurity headache. Nowadays, hackers can perform both manual and automated attacks, which grow more sophisticated day by day. The funny thing is that although some of the most popular software vulnerabilities are well-known
- August 18, 2021
- 15 min read
Pegasus has been in the headlines of major media outlets for a couple of weeks now, resurfacing such burning issues as freedom of expression and privacy concerns. The hype over Pegasus is quite reasonable: it is one of the most powerful and covertly operating software in its niche. With more and more witnesses confessing their
- August 8, 2019
- 8 min read
The story below happened to our iOS developer on his trip to Barcelona in May. Sergey works for our development unit at Redwerk and is really tech-savvy. Luckily, he knew how to act and didn’t give attackers a chance to get a hold of his information and cash when his iPhone X was stolen. How