About our blog
As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.
#Android #emulators: a #security perspective
- Why should we worry about emulators security?
- What #vulnerabilities have we found in the most popular emulators?
- How can they be used by a malicious attacker?
Join Maciej Miszczyk at @WTHConf
Warsaw, Dec 14th
If you ever wondered how to assess #vulnerabilities in the protocol implementation (this time DLMS/Cosem) you can find some information about our approach in a new article on our blog. I also encourage to click observe button on @Seqred_ profile.
Today at #SIwE conference - Information Systems in #Energetics. Join us to see live demo of the #attack on the IEC60870-5: 104 protocol and talk about #SmartMeters configuration errors to carry out an effective attack on the energy supplier and consumer.