Blog

Blog

The Critical State of Industrial Control Systems Security

Blog |
"Finally we are beginning to address the problem that we have already had in years.” This laconic sentence can sum up the conclusions of the first conference focused on security of industrial control systems (ICS).
Show

How an attacker could get your database using SQL Injection vulnerability (real demo of a hacker attack)

Blog |
We will demonstrate a real hacker attack that leads to gaining all the data in the database, including credit card information stored in the web store.
Show

How an attacker could hack your website using Cross Site Scripting Vulnerability (XSS)

Blog | | Citadelo
Our customers and friends often ask us how a real hacker attack looks like. We want to show this on a very simple, but very common vulnerability called Cross Site Scripting or XSS.
Show

Be kind to your local security researcher

Blog |
As big fans of open source, we feel the urge to support the community and contribute to the projects we like. And because our code is ugly as hell, we try to do it at least by reporting bugs and security vulnerabilities.
Show

How to improve your privacy, security and comfort with three simple Google Chrome extensions (video howto)

Blog |
In this post I would like to show you how to install three very useful Google Chrome extensions that will increase your privacy and comfort online. You can either watch this short video that will explain everything or follow this post with screenshots.
Show

Apple calls home – more privacy on OS X

Blog |
After installing the firewall application called Little Snitch, I watched which applications on my Mac OS X are connecting to the Internet. Two notable services appeared – locationd and assistantd.
Show