We have recently discovered an easy method to bypass the Windows Lock screen when a flash screensaver is running. The method allows an attacker to
When Cryptographic API Design Goes Wrong
Whether we like to admit it or not, failing to account for human factors and usability issues when designing secure systems can have unwanted consequences.
Concerns regarding the security of biometric authentication
More and more gadgets that we use these days (smart phones, smart watches, etc) try to make a personal connection with the owner via his
Intercepting functions from statically linked libraries
A common technique for blackbox penetration testing of a binary application is intercepting function calls. This technique helps the pentester to properly understand how the application works
5 Benefits of a penetration test
Penetration testing projects are definitely fun for the passionate pentesters. However, the question is what are the real benefits of a pentest for the client
Understanding PHP Object Injection
PHP Object Injection is not a very common vulnerability, it may be difficult to exploit but it also may be really dangerous. In order to