Martin MusilAug. 7, 2019
[-]

Google Smart Lock - Trusted Face

At present, new frameless mobile phones offer biometric authentication with face recognition and it became very popular among users. But is this method secure and applicable in all circumstances? In our hacking lab, we took a good look at Google solution allowing usage of this modern authentication method even on cheap mobile devices.

Martin FojtíkAug. 2, 2019
[-]

The Man Who Sold the Eiffel Tower

There is no better place to start than with the most famous con artist in history, Viktor Lustig. Although Viktor Lustig was a con man for most of his life, he became famous mainly for his scam in which he "sold" the Eiffel Tower. Let's take a closer look at how this scam, unimaginable in our times, was carried out

Jan KislingerJuly 31, 2019
[-]

Wiretapping

How easy is eavesdropping on network traffic between two computers? Would it be enough to simply cut and split the network cable? Wiretapping is a way to connect to a network cable and start eavesdropping. During eavesdropping, the original communication is "copied" to the attacker's eavesdropping device. The transmitted data is not modified in any way.

Pavel RichtarikJuly 29, 2019
[-]

Analysing Suspicious File "Outstanding Payment.jar" - Part 1

Is antivirus a 100% protection against malicious files? What techniques are used by authors of malware to avoid detection? A series of articles describes our procedure during the static analysis of a suspicious Java file and reveals interesting findings about its structure as well as about the process of analysis as such.

Michael KupkaJuly 16, 2019
[-]

Sonoff S26 Wi-Fi

And what about the security of home IoT devices? Is the level of their security still as bad? Are the manufacturers spying on their users? We have tested the smart wireless socket Sonoff S26 Wi-Fi for you, which is popular also in Czech online shops.