NCC Group Research Blog
Choosing the Right MCU for Your Embedded Device — Desired Security Features of Microcontrollers
5 months 2 weeks ago
Chrome Password Manager Cross Origin Weakness
5 months 2 weeks ago
CertPortal: Building Self-Service Secure S/MIME Provisioning Portal
5 months 2 weeks ago
Chafer backdoor analysis
5 months 2 weeks ago
CERT C Secure Coding Standard
5 months 2 weeks ago
CERT Oracle Secure Coding Standard for Java
5 months 2 weeks ago
CECSTeR
5 months 2 weeks ago
Celebrating NCC Con Europe 2018
5 months 2 weeks ago
Call Map: A Tool for Navigating Call Graphs in Python
5 months 2 weeks ago
Car Parking Apps Vulnerable To Hacks
5 months 2 weeks ago
Bypassing software update package encryption – extracting the Lexmark MC3224i printer firmware (part 1)
5 months 2 weeks ago
C Language Standards Update – Zero-size Reallocations are Undefined Behavior
5 months 2 weeks ago
Bypassing Android’s Network Security Configuration
5 months 2 weeks ago
Bypassing Oracle DBMS_ASSERT (in certain situations)
5 months 2 weeks ago
Building WiMap the Wi-Fi Mapping Drone (1)
5 months 2 weeks ago
Business Insights: Cyber Security in the Financial Sector
5 months 2 weeks ago
Building Security In: Software Penetration Testing
5 months 2 weeks ago
Building Systems from Commercial Components
5 months 2 weeks ago
Building WiMap the Wi-Fi Mapping Drone
5 months 2 weeks ago
Checked
9 hours 51 minutes ago