Outsmarting Smart Contracts – an essential walkthrough a blockchain security minefields

Outsmarting Smart Contracts – an essential walkthrough a blockchain security minefields from SecuRing   The goal of this presentation is...

Hunting for the secrets in a cloud forest

Hunting for the secrets in a cloud forest from SecuRing   Have you ever wonder if the access to your cloud kingdom is secure? Have you ever...

A 2018 practical guide to hacking RFID/NFC

A 2018 practical guide to hacking RFID/NFC from SecuRing   Ever wanted to hack these proximity/contactless cards you use every day, but did not...

GATTacking Bluetooth Smart Devices – Introducing a New BLE Proxy Tool

Bluetooth Low Energy is probably the most thriving technology implemented recently in all kinds of IoT devices: gadgets, wearables, smart homes,...

Internet banking safeguards vulnerabilities

Internet banking safeguards vulnerabilities – OWASP AppSec EU 2016 from SecuRing

Demystifying Host Card Emulation Security – Best Practices for Implementing Secure Mobile Payments

Demystifying Host Card Emulation Security – Best Practices for Implementing Secure Mobile Payments from SecuRing   Accompanying whitepaper...

Testing iOS Apps without Jailbreak in 2018

Testing iOS apps without jailbreak in 2018 from SecuRing   Penetration tests of iOS applications usually require jailbreak. On the other hand,...

Jailbreak – dylematy hazardzisty w pentestach aplikacji iOS

Jailbreak – dylematy hazardzisty w pentestach aplikacji iOS from SecuRing   Testy penetracyjne aplikacji iOS nierzadko wymagają...

REST API Pentester’s perspective

REST API Pentester's perspective from SecuRing

Hacking Bluetooth Smart

Hacking Bluetooth Smart from Slawomir Jasek