ConCon Blog

Show left menu  
Hide left menu  
Thick client application testing
Manipulating client-side variables in Java applications

By Lewis Stoate, 21 Dec. 2016

Penetration testing of thick client applications is a common service performed at Context. For those unfamiliar with the term, in the context of application penetration testing, thick clients are any ...

Mobile Malware
Mobile Malware State of Play

By Adam Bridge and Scott Lester, 18 Nov. 2016

For a while we've been suggesting to our colleagues that mobile malware is not being dealt with as maturely as is desktop malware. Anecdotally, it seems like a lot of ...

Securing Corporate Mobile Devices

By Craig Donkin, 02 Nov. 2016

Mobile computing is well and truly ubiquitous, and has transformed the business world. But the risk of devices being stolen or compromised is a real threat to many organisations, which ...

IoT devices attack
The Internet of Broken Things: why security testing matters

26 Oct. 2016

The recent Distributed Denial of Service (DDoS) attacks against the security journalist Brian Krebs’ blog and then the Domain Name Service (DNS) provider Dyn (which broke large chunks of the ...

Targeting Android for OTA Exploitation
Targeting Android for OTA Exploitation

By Tom Court and Neil Biggs, 19 Oct. 2016

‘If you know the enemy and know yourself, you need not fear the result of a hundred battles’ – Sun Tsu. Whilst it is unlikely that Sun Tzu had software ...

Free Wifi Zone
The Perils of Public Wireless Networks: How I Stole Your Hash

13 Oct. 2016

It’s a question that gets asked all the time – “How Do I keep my computer secure online?” By now we should all know the usual recommendations, such as using ...

Prevent cyber attack
In the news: TalkTalk hit with record fine

10 Oct. 2016

It was announced recently that telecoms company TalkTalk has been fined £400,000 by the Information Commissioner’s Office (ICO) for failing to prevent the cyber-attack, which allowed an attacker to access ...

Back to Top