Malc0de CyberNet
Fulfill your daily dose of Security & Tech News.

write for us

Want to write for us?

We’re always looking for passionate people to contribute to Technical Articles including Latest Tech news, Android or iOS news,  Linux, OpenSource News, How To Guides, Security, InfoSec, Ransomware and /or similar niches, to our digital portfolio of technology publications.

How can writing for us benefit you?

We are a consumer technology site with a great aim and ambition and we are constantly growing. If you contribute today then you could get your portfolio as you were a part of something big from a very early stage and helped to grow the community. It would show off your leadership and dedication for work and moreover, at a later stage, you will earn for all the articles you have written. You get complete credits for the articles you share. You can read about us here.

Sooner or later writing for us is an excellent profile raiser for both you. We share all our articles across numerous social accounts giving you visibility from hundreds of thousands of people within your niche. For Advertising or Publishing, Promotional Articles related to your Product / Company / Services on our site, Please Refer to the Instructions Here.

How often would you need to write for us?

You can write for us as much or as little as you want; could be once a month, three times a month or just once a year. It’s completely up to you.

So get in touch…

Whatever your specialty in the technology industry, we’d love to hear from you. Contact write [at] malc0de.org to discuss potential topic areas. We look forward to hearing from you. You can even fill the form below.

Our Blog Posts

Pre-installed App on OnePlus devices Collects System logs

OnePlus seems to be in a bad run of security incidents recently. The company was first caught collecting extensive user data and leaving behind a backdoor allowing root access. Soon after the revelation of this pre-installed backdoor, another "secret" app has been unearthed that records substantial phone logs. OnePlusLogKit, another pre-installed system-level debug application can capture system stats and information, and stores them in an unencrypted log file. Behind the discovery is a Twitter user, going by the…

Thwart Digital Thieves: 3 Vital Online Business Security Measures

One of the biggest changes that have impacted business across the world is this switch or inclusion of a digital marketplace, apart from a physical one. With this major change, the way that businesses have been storing their confidential information has also changed. Traditional methods of storing data for businesses have been through physical documents, storing confidential data on a standalone computer, or through a localized and secure network. While most businesses continue to employ one or more of these established…

Should You Move Your Blogging Site To HTTPS?

I started blogging a few months ago. It was agonizing in the beginning. How to make the blog home page look best, what color theme to use, what categories should I display and so on. But, there was one question which never occurred to me, until a scary thing happened. I literally lost my blog for some time. It got hacked. Is awesome random users added as contributors and one even as an admin, without my knowledge? Apparently, my admin panel login credentials were too easy for anyone to get into and lock mine out of my…

Researchers Report Malware That Secretly Record Audio And Steal Logs

Security firm Lookout has detected a spyware family that has flooded Android app stores, including the official Google Play store with over 1,000 spyware apps. Dubbed SonicSpy, these spyware have the capability to monitor almost every action on an infected device. SonicSpy had been uncovered by researchers at Lookout after they found three versions of it, namely Soniac, Hulk Messenger and Troy Chat, live in the official Google Play app store, each disguised as a messaging service. Marketed as a messaging application,…

Self-Driving Cars Can Be Hacked By Just Putting Stickers On Street Signs

Ever since self-driving cars became a hot topic of interest, methods of exploitation have inevitably crept in. There have been reports of vulnerabilities in the software. Demonstrations on possible ways of hijacking a car remotely and disabling certain features have also come to light. However, recent studies show a simple way to confound a self-driving car's algorithm. Small changes on a road sign can trigger misidentifying of signs and thus lead to accidents. A team of researchers from the University of Washington…