September 22nd, 2019 📆 | 7327 Views ⚑
The speaker will tell about underestimated vulnerabilities of Android applications. He will demonstrate how to bypass the application security mechanisms
July 16th, 2019 📆 | 3549 Views ⚑
Watch the video of a recent webinar by Jimmy Jones, Telecom Business Development Lead at Positive Technologies. In his presentation
April 14th, 2019 📆 | 2021 Views ⚑
Любое использование данного материала без прямого разрешения АО «Позитив Текнолоджиз» запрещено. source
Tagged with: bounty
July 12th, 2018 📆 | 5379 Views ⚑
Владельцы публично доступных ресурсов несут серьезные репутационные и финансовые убытки из-за уязвимостей. Докладчик поведает о недостатках существующих способов борьбы с
Tagged with: bounty
July 12th, 2018 📆 | 8610 Views ⚑
Vulnerabilities cause significant reputational and financial losses for owners of public websites. The speaker will talk about pros and cons
November 1st, 2013 📆 | 6876 Views ⚑
Collecting and analyzing public information on the target, aka Open Source Intelligence (OSINT), is a mandatory stage of a modern
October 11th, 2013 📆 | 5570 Views ⚑
Collecting and analyzing public information on the target, aka Open Source Intelligence (OSINT), is a mandatory stage of a modern
October 11th, 2013 📆 | 3323 Views ⚑
Network Forensics Labs – network forensics with xplico — demo, lab – network forensics with NetworkMiner – some challenges for
October 10th, 2013 📆 | 7639 Views ⚑
Обязательным этапом современного теста на проникновение является сбор и анализ общедоступной информации о цели (Open Source Inteligence, или OSINT). Значение
Tagged with: osint
Comments