Blog

Blog

32C3: Gated Communities – report from hacker conference

Blog | | Citadelo
The thirty-second annual Chaos Communication Congress carried the tagline “Gated Communities”. CCC is probably the oldest hacker conference and “Gated communities” worked very well as a theme for this year.
Show

The Critical State of Industrial Control Systems Security

Blog |
"Finally we are beginning to address the problem that we have already had in years.” This laconic sentence can sum up the conclusions of the first conference focused on security of industrial control systems (ICS).
Show

How an attacker could get your database using SQL Injection vulnerability (real demo of a hacker attack)

Blog |
We will demonstrate a real hacker attack that leads to gaining all the data in the database, including credit card information stored in the web store.
Show

How an attacker could hack your website using Cross Site Scripting Vulnerability (XSS)

Blog | | Citadelo
Our customers and friends often ask us how a real hacker attack looks like. We want to show this on a very simple, but very common vulnerability called Cross Site Scripting or XSS.
Show

Be kind to your local security researcher

Blog |
As big fans of open source, we feel the urge to support the community and contribute to the projects we like. And because our code is ugly as hell, we try to do it at least by reporting bugs and security vulnerabilities.
Show

How to improve your privacy, security and comfort with three simple Google Chrome extensions (video howto)

Blog |
In this post I would like to show you how to install three very useful Google Chrome extensions that will increase your privacy and comfort online. You can either watch this short video that will explain everything or follow this post with screenshots.
Show