NCC Group Research Blog
Choosing the Right MCU for Your Embedded Device — Desired Security Features of Microcontrollers
6 months ago
Chrome Password Manager Cross Origin Weakness
6 months ago
CertPortal: Building Self-Service Secure S/MIME Provisioning Portal
6 months ago
Chafer backdoor analysis
6 months ago
CERT C Secure Coding Standard
6 months ago
CERT Oracle Secure Coding Standard for Java
6 months ago
CECSTeR
6 months ago
Celebrating NCC Con Europe 2018
6 months ago
Call Map: A Tool for Navigating Call Graphs in Python
6 months ago
Car Parking Apps Vulnerable To Hacks
6 months ago
Bypassing software update package encryption – extracting the Lexmark MC3224i printer firmware (part 1)
6 months ago
C Language Standards Update – Zero-size Reallocations are Undefined Behavior
6 months ago
Bypassing Android’s Network Security Configuration
6 months ago
Bypassing Oracle DBMS_ASSERT (in certain situations)
6 months ago
Building WiMap the Wi-Fi Mapping Drone (1)
6 months ago
Business Insights: Cyber Security in the Financial Sector
6 months ago
Building Security In: Software Penetration Testing
6 months ago
Building Systems from Commercial Components
6 months ago
Building WiMap the Wi-Fi Mapping Drone
6 months ago
Checked
1 hour 26 minutes ago