A recently recorded run-through of our popular session providing an overview on the Dark Web.
A walk-through demo of exploiting web application vulnerabilities on an example site we built.
Access cards are used everywhere on a day to day business, ranging from highly secure facilities to medium scale enterprises to small businesses. Most access cards use some kind of Radio Frequency ID (RFID) technology.
This blog covers the one ever-present at the bottom of the telecoms technology stack: SIM cards.