Secure design and codding

Seven-Step Guide to SecuRing your AWS Kingdom

AWS (Amazon Web Services) tries to decrease the number of security issues among its customer by releasing new services or upgrading the old ones....

Transaction Authorization Cheat Sheet

Update 23/12/2015  Version 2.0   Transaction authorization is implemented in modern financial systems in order to protect against unauthorized...

Mobile payment card cloning possibilities

  Nowadays we are observing very dynamic adoption of mobile contactless payments. These are systems provided by OS manufacturers (Android Pay,...

HCE cloning FAQ

  HCE cloning FAQ Our research demonstrated that it is possible to copy mobile contactless card data, enrol it to another phone, and use it for...

Armouring your SaaS #1: My obviously bulletproof SaaS

Mateusz Olejarka (mateusz.olejarka@securing.pl, @molejarka)   Do you enjoy the feeling that your company is the best, and your products –...