Articles

  • 3 days ago | dev.to | Alex Vakulov

    It is difficult to claim that any system or program is completely secure. All of them may contain potential vulnerabilities - errors made during the development process - that can lead to serious consequences. Attackers often exploit such flaws. Information security companies continuously monitor vulnerabilities and update security databases.

  • 2 weeks ago | cacm.acm.org | Doug Meil |Alex Vakulov

    A lot of things have come and gone in the last few decades in computing. This post will cover a short list of topics that I saw in my career that were either notable or that people used to argue about a lot. Or both. Some of this might be a fun trip down memory lane, and some may be PTSD-inducing, but it is important to periodically look back in computing to learn from past experiences, as things that seem inevitable outcomes today weren’t always so clear at the time.

  • 2 weeks ago | cacm.acm.org | Yatish Turakhia |Alex Vakulov

    Dynamic programming (DP), first introduced by Richard Bellman in the 1950s, is a fundamental algorithmic technique in computer science with broad applicability across numerous domains. In computational genomics, it has proven particularly effective for sequence-comparison tasks, including those involving DNA, RNA, and proteins. Over the past two decades, advancements in sequencing technologies have massively reduced costs and increased throughput, leading to rapid growth in genomic data.

  • 2 weeks ago | cacm.acm.org | Alex Vakulov

    Offensive security (OffSec) is a proactive cybersecurity approach aimed at identifying and eliminating vulnerabilities in systems and applications before attackers can exploit them. To achieve this, OffSec specialists simulate hacker activities by conducting controlled attacks on a company’s infrastructure to uncover security gaps ranging from configuration flaws and Internet of Things (IoT) vulnerabilities to zero-day threats and human-related weaknesses.

  • 3 weeks ago | hackernoon.com | Alex Vakulov

    Every year, over 4.5 billion SIM cards are produced globally, generating approximately 20,000 tons of plastic waste and significant carbon emissions. These impacts arise from the materials used in production, the energy-intensive distribution process, and their eventual disposal. Despite their small size, traditional SIM cards can, therefore, contribute heavily to environmental degradation.

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →

X (formerly Twitter)

Followers
961
Tweets
1K
DMs Open
No
Alex Vakulov
Alex Vakulov @vakulov_alex
11 May 25

🧠 Cybercriminals don’t just hack systems—they choose their tools wisely. From low-level exploits in C to stealthy scripts in PowerShell, the languages behind malware reveal how modern attacks are built and deployed. READ: https://t.co/wLXNF4btKG

Alex Vakulov
Alex Vakulov @vakulov_alex
6 May 25

📱 Worried about SIM swap attacks? Here’s how to stay safe: – Don’t overshare online – Use strong, unique passwords – Avoid storing logins in apps – Lock your SIM with a PIN – Use MFA (not just SMS!) – Watch for sudden signal loss 🔒 Stay alert, READ: https://t.co/erOKkF6XE2

Alex Vakulov
Alex Vakulov @vakulov_alex
5 May 25

📵 Think you’ve been SIM swapped? Watch for: – No signal or service – Locked out of key accounts – Unfamiliar password reset requests – Carrier messages you didn’t trigger – Friends get strange texts from you – Login alerts from unknown devices READ: https://t.co/erOKkF6pOu