by Iosif Androulidakis | Jan 19, 2016 |
In the next few blog posts we will focus on both landline and mobile telecommunication systems security. This is the first in a series of articles that will present the theoretical background behind a method to intercept calls and SMS in GSM networks, while the next...
by George Karagiannidis | Apr 14, 2015 |
App development is becoming more and more popular, as web and software developers are migrating to the mobile industry. Apps have become a part of mainstream culture and entered our everyday lives – at increasing levels. The app economy is comprised of approximately 2...
by Yiannis Koukouras | Jun 6, 2014 |
What do you choose as a pentester, when your work ethics are in conflict with your dedication to the security community. To disclose vulnerabilities you’ve found or not to disclose? As a penetration tester, during an engagement you are often asked to assess a product...
by Yiannis Koukouras | Jun 5, 2014 |
This is not just another technical blog, although technical articles have a big share here; This blog aims to address everyday issues of the security community and through your help add a penny to the evolution of security worldwide.