News

Done properly, digital forensic investigations save your business time and money. Devices provide a wealth of evidence sources that can be used to prove or disprove facts. The aim of digital forensics ...
TL;DR Converted a real car into a game controller by intercepting CAN data Tapped into the CAN bus using cheap wire splicers and a Kvaser USBCAN interface Mapped steering, brake, and throttle signals ...
Ken Munro will be presenting: All at sea. Thought your OT / IT infrastructure was complex? Try doing it on a cruise ship ...
TL;DR Introduction The Content Security Policy (CSP) is a layer of security for web applications that helps detect and stop ...
Our team has experience across various AI deployment models, with services which can cater to the risks associated with each. Our internal methodologies are aligned with industry standard ...
Paul Brownridge will be presenting: Breach preparation. When it’s all going south, what should you wish that you had done yesterday?
When we planned PTP Cyber Fest, we set out to create something different from the usual cybersecurity events. After two busy days, we can proudly say the event delivered exactly what we hoped for and ...
Ken Munro will be on the Securing EFBs: Balancing Safety and Accessibility panel.
How Tos How to load unsigned or fake-signed apps on iOS George Waterfield 28 May 2025 10 Min Read ...
TL;DR Restricted View allows users to read files, but not copy, download or print them Attackers will look for ways to circumvent these controls Traditional workarounds include manual transcription, ...
In digital forensic investigations involving suspected data exfiltration, the analysis of unallocated space plays a critical role. Unallocated space refers to portions of a storage device that are not ...
TL;DR Introduction When a data breach hits the news, it’s usually all about the numbers: millions of names, emails, and maybe even credit card details stolen. Sounds serious, right? But here’s the ...