Break News

Pick Slider Label

item-thumbnail
item-thumbnail

From China, With Love

Lest anyone think that D-Link is the only vendor who   puts backdoors   in their products, here’s one that can be exploited with a single ...

item-thumbnail

Burp SessionAuth Extension

Overview Normally a web application should identify a logged in user by data which is stored on the server side in some kind of session ...

item-thumbnail

Android Hack-Tool Steals PC Info

Over the weekend, Yeh, one of our Security Response Analysts, came across some interesting analysis on a Chinese language forum about an ...

item-thumbnail

The most sophisticated Android Trojan

Recently, an Android application came to us for analysis. At a glance, we knew this one was special. All strings in the DEX file were en...

item-thumbnail

Cracking Credit Card Hashes with PowerShell

As penetration testers, we are frequently engaged to do penetration tests for PCI compliance. As a part of these penetration tests, w...

item-thumbnail

Stupid Little IPv6 Tricks

With the IPv6 Summit on Friday, various IPv6 related topics are of course on my mind. So I figured to put together a quick laundry list o...

item-thumbnail

Steps Toward Weaponizing the Android Platform

The mobile and tablet market have been flooded by millions upon millions of Android based devices. I wonder if Ken Thompson or Dennis Ritch...

Home index

Downloads[two]

Books[right]

Photos[carousel](6)

Accessories[combine]

Follow by Email

Recommend on Google

Advertisements

Advertisements

Popular Posts

Random Posts

Recent Posts

ADS

eXTReMe Tracker