Decrypting

Categories for ,

April 27, 2016

A Whitehack Application Security Consultant has received another acknowledgment from Mozilla Corporation after reporting a cross-site scripting issue on a live reporting tool situated at crash-stats.mocotoolsstaging.net. This vulnerability could have enabled an attacker to hijack session details for staff and... Read more


April 11, 2016

Or, how did the Panama Papers Whistle-blower do it? Background. 2.6 Terabytes is ALOT of data. Especially when you’re talking about text files and scanned documents, and not media files such as movies. Ex filtrating 40 years of Mossack Fonseca... Read more


February 17, 2016

At the end of last year, Vtech’s Learning Lodge, Kid Connect and PlanetVTech databases were hacked, exposing the data of around 5 million parents and around 6 million children. Vtech themselves noted that the ‘databses were not as secure as... Read more


October 29, 2015

Security is a process. Not a product.   Background. This cheat sheet was initially prepared as part of our participation in the international association of privacy professional’s recent event, ‘The Hacker, the Lawyer, the Client’.   We’ve decided to share the... Read more


October 10, 2015

Background This short guide to reverse engineering (“Reverse Engineering 101”) goes over some free and inexpensive tools for reverse engineering. Example uses of the basic but essential tools are given. A brief guide to the iOS app reverse engineering process... Read more


September 29, 2015

Part 1: Scope is important Part 2: Know thy vendor: Picking a penetration testing company. Part 1: Defining the Scope of your Information Security Request For Proposal (RFP) There are plenty of proposal templates out there for information security, the... Read more


September 29, 2015

Background The customer is a large retail business with their own network infrastructure including web servers and payment portals which previously handled all of their requirements. Now they have gone to a mobile ordering and payment processing model, with roughly 70% of... Read more


September 9, 2015

The inaugural Australian Cyber Security Centre (ACSC) threat report was released on the 29th of July. [1] The report is a collaborative effort of several departments, including Federal Police and intelligence agencies. It’s a call for vigilance and a proactive... Read more


Fields marked with an * are required
Find out more
Recent Posts

Not-For-Profit & Education Discounts

18 July 2016

a team of highly skilled ethical hackers

Read More

Whitehack Information Security Consultant Finds Critical Vulnerability within AVG Owned Domain

30 June 2016

a team of highly skilled ethical hackers

Read More

ABC Four Corners Films Segment at WHITEHACK

03 June 2016

a team of highly skilled ethical hackers

Read More

ABC Radio Chat: TrainLink & Myspace Hack

31 May 2016

a team of highly skilled ethical hackers

Read More

Categories
News
Security