Mobile Application Security: Best Practices

Are you responsible for the process of application creation and development?   In our guide you will find key issues regarding mobile...

Developing Secure Blockchain Applications

You can find many articles about blockchain because there has been a lot of discussion about this technology in recent years. Blockchain is often...

GATTacking Bluetooth Smart Devices – Introducing a New BLE Proxy Tool

Bluetooth Low Energy is probably the most thriving technology implemented recently in all kinds of IoT devices: gadgets, wearables, smart homes,...

Struts security app-ocalypse. IT security manager’s survival guide

Sławek Jasek – IT security expert, SecuRing   The problem  Recently, we have seen one of the most spectacular data breaches in history. Equifax...

Mobile payment card cloning possibilities

  Nowadays we are observing very dynamic adoption of mobile contactless payments. These are systems provided by OS manufacturers (Android Pay,...

HCE cloning FAQ

  HCE cloning FAQ Our research demonstrated that it is possible to copy mobile contactless card data, enrol it to another phone, and use it for...

Several polish banks hit by watering hole attack – lessons learnt?

Wojciech Dworakowski (wojciech.dworakowski@securing.pl, @wojdwo)   Last days Badcyber.com –informed about ongoing attack on polish banks....

Armouring your SaaS #1: My obviously bulletproof SaaS

Mateusz Olejarka (mateusz.olejarka@securing.pl, @molejarka)   Do you enjoy the feeling that your company is the best, and your products –...