ConCon Blog

Show left menu  
Hide left menu  
Nation States: The Godfathers of Targeted Attacks

By Kat Demidecka, 15 Sept. 2015

For many years the world of targeted cyber attacks was limited to nation states; few others had the understanding, resources or much to gain from carrying out such an attack. ...

Guide book
A Scout’s Guide to Incident Response

By Nick Mazitelli, 08 Sept. 2015

This part of our blog series, covering the recent work we have done with the Institution of Engineering and Technology, looks at incident response, drawing on the article we contributed ...

Shield of magnifying glass
Good advice, a rare commodity?

By Nick Mazitelli, 02 Sept. 2015

Information is the lifeblood of effective cyber security. Without a current understanding of the threats, protections, technologies and best practices cyber security activity will be divorced from the reality on ...

Android robot
KGDB on Android: Debugging the kernel like a boss

By Andy Monaghan, 17 Aug. 2015

A few months back I purchased the Android Hacker's Handbook. For those of you who haven't got a copy and are interested in the Android security landscape, I'd highly recommend ...

Fishing hook
Wireless Phishing with Captive Portals

By Jan Tudor, 20 July 2015

In this post we describe a simple technique that has been around for some time that is still relevant today given the proliferation of open access wireless networks. Most people ...

DNS image
DNSWatch - When a full DNS tunnel is just too much

By Sven Schlueter, 07 July 2015

During certain engagements it is a requirement to extract data from a network - or at least prove that it would be possible in different ways. One common and very ...

Vulnerability Statistics & Trends in 2015

By Steven Lamb, 22 June 2015

I have conducted research using Context’s penetration testing management database across 3,475 web application and infrastructure penetration tests for the years 2013, 2014 & 2015. The research included a statistical ...

Back to Top