ConCon Blog

Show left menu  
Hide left menu  
Unicorn and Dog
Hacking Unicorns with Web Bluetooth

By Paul Stone, 28 Feb. 2017

Some news broke yesterday about the CloudPets toy we've been looking at over the last few months. Researchers discovered an unsecured MongoDB server that exposed sensitive CloudPets customer data. My ...

Mitel blog
Phwning the boardroom: hacking an Android conference phone

By Tom Moreton, 15 Feb. 2017

At Context we’re always on the lookout for interesting devices to play with. Sat in a meeting room one day, we noticed that the menus on the conference phone, a ...

User awareness training
User Awareness: An Important Tool in Protecting Your Organisation from Cyber Threats

By Tom Williams, 07 Feb. 2017

Making your employees aware of the cyber threats they might face, both at work and at home, is an invaluable exercise. On its own, this activity is certainly not going ...

Mobile phone
WAP just happened to my Samsung Galaxy?

By Tom Court and Neil Biggs, 24 Jan. 2017

This is the third in a series of blogs about how, even in 2017, SMS-based attacks on Android phones are still viable. In part one, Al described how to set ...

Thick client application testing
Manipulating client-side variables in Java applications

By Lewis Stoate, 21 Dec. 2016

Penetration testing of thick client applications is a common service performed at Context. For those unfamiliar with the term, in the context of application penetration testing, thick clients are any ...

Mobile Malware
Mobile Malware State of Play

By Adam Bridge and Scott Lester, 18 Nov. 2016

For a while we've been suggesting to our colleagues that mobile malware is not being dealt with as maturely as is desktop malware. Anecdotally, it seems like a lot of ...

Securing Corporate Mobile Devices

By Craig Donkin, 02 Nov. 2016

Mobile computing is well and truly ubiquitous, and has transformed the business world. But the risk of devices being stolen or compromised is a real threat to many organisations, which ...

Back to Top