We need to go deeper – Testing inception apps

We need t go deeper – Testing inception apps. from SecuRing   When it comes to thick-clients, java applets, embedded devices or mobile...

Building & Hacking Modern iOS Apps

Building & Hacking Modern iOS Apps from SecuRing   After my offensive presentation “Testing iOS Apps without Jailbreak in 2018”...

Artificial Intelligence – a buzzword, new era of IT or new threats?

Artificial Intelligence – a buzzword, new era of IT or new threats? from SecuRing   In my presentation I will show you a couple of applications...

Security education via security features

Security education via security features from SecuRing   Let’s talk about UX and security – those two may not seem to go...

Attacking AWS: the full cyber kill chain

Attacking AWS: the full cyber kill chain from SecuRing   While it is quite common practice to do periodic security assessments of your local...

Outsmarting Smart Contracts – an essential walkthrough a blockchain security minefields

Outsmarting Smart Contracts – an essential walkthrough a blockchain security minefields from SecuRing   The goal of this presentation is...

Building&Hacking modern iOS apps

Building&Hacking modern iOS apps from SecuRing   After my successful presentation “Testing iOS Apps without Jailbreak in 2018”...

Testing iOS Apps without Jailbreak in 2018

Testing iOS apps without jailbreak in 2018 from SecuRing   Penetration tests of iOS applications usually require jailbreak. On the other hand,...

Jailbreak – dylematy hazardzisty w pentestach aplikacji iOS

Jailbreak – dylematy hazardzisty w pentestach aplikacji iOS from SecuRing   Testy penetracyjne aplikacji iOS nierzadko wymagają...

Hunting for the secrets in a cloud forest

Hunting for the secrets in a cloud forest from SecuRing   Have you ever wonder if the access to your cloud kingdom is secure? Have you ever...

A 2018 practical guide to hacking RFID/NFC

A 2018 practical guide to hacking RFID/NFC from SecuRing   Ever wanted to hack these proximity/contactless cards you use every day, but did not...

REST API Pentester’s perspective

REST API Pentester's perspective from SecuRing

GATTacking Bluetooth Smart Devices – Introducing a New BLE Proxy Tool

Bluetooth Low Energy is probably the most thriving technology implemented recently in all kinds of IoT devices: gadgets, wearables, smart homes,...

Internet banking safeguards vulnerabilities

Internet banking safeguards vulnerabilities – OWASP AppSec EU 2016 from SecuRing

Demystifying Host Card Emulation Security – Best Practices for Implementing Secure Mobile Payments

Demystifying Host Card Emulation Security – Best Practices for Implementing Secure Mobile Payments from SecuRing   Accompanying whitepaper...

Hacking Bluetooth Smart

Hacking Bluetooth Smart from Slawomir Jasek