I'm looking for the perfect pants. They’re brown. They’re sturdy. They’re business casual. They have many huge pockets, artfully arranged so that I don’t look like a pack rat even …

Read Story

Sometimes, walls get in the way, and when that happens, we need a door. A door needs a proper lock, or a security vulnerability may result. Server-side request forgery (SSRF) …

Read Story

The AirDroid app for Android has surpassed 20 million downloads from the Google Play store and has received raving reviews from the likes of USA Today and Lifehacker. The app’s …

Read Story

This blog post is the first in an ongoing series about AWS security best practices. Amazon Web Services (AWS) is arguably the most popular cloud computing platform. With the platform’s …

Read Story

You’re a professional. You’re equipped with the latest in elite, customized RFID hacking tools. So, it's high time you put a silencer on your Tastic RFID Thief – the weaponized, …

Read Story

Are you plagued by Google bot detection? Are your SearchDiggity scans almost immediately pausing, promising you that they’ll be “Auto-resuming in 15 minutes.”? Do you want to avoid the frustration …

Read Story

Random number generation has been insecure for decades and there hasn’t been a practical pen testing tool to tackle this problem – until now, that is. Enter Untwister Untwister is …

Read Story

Each summer, the most innovative minds in the infosec industry gather in Las Vegas to discuss new findings, research, and tools. They appear at conferences like Black Hat USA and …

Read Story

Subscribe by Email