ConCon Blog

Show left menu  
Hide left menu  
Mitel blog
Phwning the boardroom: hacking an Android conference phone

By Tom Moreton, 15 Feb. 2017

At Context we’re always on the lookout for interesting devices to play with. Sat in a meeting room one day, we noticed that the menus on the conference phone, a ...

User awareness training
User Awareness: An Important Tool in Protecting Your Organisation from Cyber Threats

By Tom Williams, 07 Feb. 2017

Making your employees aware of the cyber threats they might face, both at work and at home, is an invaluable exercise. On its own, this activity is certainly not going ...

Mobile phone
WAP just happened to my Samsung Galaxy?

By Tom Court and Neil Biggs, 24 Jan. 2017

This is the third in a series of blogs about how, even in 2017, SMS-based attacks on Android phones are still viable. In part one, Al described how to set ...

Thick client application testing
Manipulating client-side variables in Java applications

By Lewis Stoate, 21 Dec. 2016

Penetration testing of thick client applications is a common service performed at Context. For those unfamiliar with the term, in the context of application penetration testing, thick clients are any ...

Mobile Malware
Mobile Malware State of Play

By Adam Bridge and Scott Lester, 18 Nov. 2016

For a while we've been suggesting to our colleagues that mobile malware is not being dealt with as maturely as is desktop malware. Anecdotally, it seems like a lot of ...

Securing Corporate Mobile Devices

By Craig Donkin, 02 Nov. 2016

Mobile computing is well and truly ubiquitous, and has transformed the business world. But the risk of devices being stolen or compromised is a real threat to many organisations, which ...

IoT devices attack
The Internet of Broken Things: why security testing matters

26 Oct. 2016

The recent Distributed Denial of Service (DDoS) attacks against the security journalist Brian Krebs’ blog and then the Domain Name Service (DNS) provider Dyn (which broke large chunks of the ...

Back to Top