by Iosif Androulidakis | Jun 2, 2017 |
Introduction Unless you have been living in a cave, you most probably have heard about the General Data Protection Regulation (GDPR) fuzz. Even worse, you might be responsible for actually implementing GDPR in your company/organization. Although the fines and...
by christina | Jan 10, 2017 |
From the beginning of the Internet, sending of junk email has been prohibited. Gary Thuerk sent the first email Spam message in 1978 to 600 people. A few decades later the European Union came to regulate this issue permanently with EU Directive 2002/58/EC, 1 year...
by Matos Kapetanakis | Jul 10, 2016 |
TwelveSec and the Department of Digital Systems of the University of Piraeus are proud to be organising the Greek National Cyber Security team! ENISA (the European Union Agency for Network and Information Security) is running its annual European Cyber Security...
by George Karagiannidis | May 23, 2016 |
Gaining access to a remote system always gives us pentesters a feeling of satisfaction. Specifically, gaining remote command execution on a system is the ultimate goal for a pentester, in order to gain an initial foothold into the target’s system. Besides direct...
by Iosif Androulidakis | Mar 10, 2016 |
Practical Setup and tools In the previous “Using a GSM tester” post, we examined the theoretical aspect of the fake base station attack. Today, we will focus on more technical details, discussing about the equipment needed, and the setup required for the...