by John Poch | Nov 4, 2019 | News
Asset management is a problem we help many of our customers with. What are an organization’s assets, and how accurate and up-to-date is this information? Even with a mature asset management program, organizations want some form of validation of their result....
by Danny Rosseau | Aug 30, 2019 | Danny Rosseau, Feature, News
One of the more common findings we report for Android security reviews is an issue involving hard coded secrets. This blog post will specifically focus on hard coded secrets used for encrypting application data. I’ll try to use a bit of light threat modeling and...
by Danny Rosseau | Aug 22, 2019 | Danny Rosseau, Feature, News
When this Project Zero report came out I started thinking more about USB as an interesting attack surface for IoT devices. Many of these devices allow users to plug in a USB and then perform some actions with that USB automatically, and that automatic functionality...
by Jonathan Wrightsell | Aug 21, 2019 | Feature, News
When reverse engineering a binary application, at its lowest practical layer, the reverse engineer is looking at CPU-specific assembly language. In order to fully understand the application, the reverse engineer would need to understand those lower layers, instruction...
by Jesson Soto-Ventura | Aug 19, 2019 | Feature, News
A few months ago, I was testing the email functionality on a company’s contact us page, when I sent an email to myself containing: <script> alert(“Hi, It’s almost lunch time”) </script> It actually was close to lunch time, so I wrapped up...
by Brad Dixon | Aug 9, 2019 | Feature, News
If you missed Brad’s talk, sign up for his Webinar. You might not know it but right now thousands of athletes are training and competing in virtual worlds. I’m not talking about League of Legends or Fortnite. Those games aren’t the only eSports in...