Mobile Application Security: Best Practices

Are you responsible for the process of application creation and development?   In our guide you will find key issues regarding mobile...

Developing Secure Blockchain Applications

You can find many articles about blockchain because there has been a lot of discussion about this technology in recent years. Blockchain is often...

Seven-Step Guide to SecuRing your AWS Kingdom

AWS (Amazon Web Services) tries to decrease the number of security issues among its customer by releasing new services or upgrading the old ones....

GATTacking Bluetooth Smart Devices – Introducing a New BLE Proxy Tool

Bluetooth Low Energy is probably the most thriving technology implemented recently in all kinds of IoT devices: gadgets, wearables, smart homes,...

Connected Car Security – Threat Analysis and Recommendations

Here we present a document which analyzes attack vectors and potential threats for connected car. For each attack vector (telematics connection, SMS...

Transaction Authorization Cheat Sheet

Update 23/12/2015  Version 2.0   Transaction authorization is implemented in modern financial systems in order to protect against unauthorized...

GATTacking Bluetooth Smart devices

Bluetooth Low Energy incorporates device pairing and link-layer encryption. However, significant amount of devices do not implement these features....

Script-based malware detection in Online Banking Security Overview

Online banking applications are particularly exposed to malware attacks. In order to prevent stealing from customer accounts, banks have invested in...