With smartphones companies allowing people a convenience to perform multiple tasks and purchase transaction over their phone, also opens the door for hackers, intruders and other costly exploits that you might have not been known to. And, especially when the news broke out by researchers that I have covered in....
Author
Latest Articles
- BlogJanuary 26, 2018Effects of Biometrics Co-Used with Password
- BlogDecember 28, 2017Networks, What do you mean by that?
- BlogDecember 4, 2017Thick Client Penetration Testing – Exploiting JAVA Deserialization Vulnerability for Remote Code Execution
- BlogNovember 28, 2017Extending attack surface in distributed environments
Subscribe
Login
0 Comments