loading...

Using a Reverse Proxy to Protect Third Party APIs

Reactions 9
7 min read

How to Protect Against Certificate Pinning Bypassing

Reactions 6
13 min read

Bypassing Certificate Pinning

Reactions 10
6 min read

Securing HTTPS with Certificate Pinning on Android

Reactions 14
13 min read

Steal That Api Key With A Man In The Middle Attack

Reactions 49 Comments 2
9 min read

Google and Samsung Fix Android Flaw that Allowed to Hijack your Camera and Audio to Spy on You

Reactions 6
3 min read

Bypassing GitHub's OAuth flow

Reactions 12
2 min read

Hackers are using a bug in PHP7 to remotely hijack web servers

Reactions 13
2 min read

Sudo Flaw Lets Linux Users Run Commands As Root Even When They're Restricted

Reactions 5 Comments 1
1 min read

#discussMillions of Phones Leaking Information Via Tor

Reactions 8
2 min read

Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks

Reactions 6
2 min read

This huge Android trojan malware campaign was discovered after the gang behind it made basic security mistakes

Reactions 6 Comments 5
2 min read

Attackers exploit 0day vulnerability that gives full control of Android phones

Reactions 6 Comments 2
2 min read

#discussThe iOS Checkm8 jailbreak is hugely significant, but not for you

Reactions 5
1 min read

Android Devices Being Shipped with TCP Port 5555 Enabled

Reactions 11 Comments 3
2 min read

Browser Based Cyber Threats

Reactions 13 Comments 3
2 min read

Containers Under Attack

Reactions 20 Comments 9
1 min read

Do you know that DNS queries do not protect your privacy?

Reactions 13 Comments 1
1 min read

#discussRaising security awareness with a CTF competition... did you already participate in one, how it was?

Reactions 7
1 min read

Revenge Hacking Is Hitting the Big Time

Reactions 29 Comments 4
1 min read
loading...