No source? No problem…
Jul 16th, 2012
Written by: Admin
News
When performing any kind of product assessment, it is always preferable to have the source code. However, in the real world we all know that this isn’t always possible and…
Jul 16th, 2012
Written by: Admin
News
When performing any kind of product assessment, it is always preferable to have the source code. However, in the real world we all know that this isn’t always possible and…
Jul 8th, 2012
Written by: Admin
News
MDSec will be delivering the WAHH live training course at BlackHat USA again this year. The course syllabus follows the chapters of the Second Edition of The Web Application Hacker’s…
May 10th, 2012
Written by: Admin
Mobile
This if the first in a series of blog posts about iOS and iOS platform security, encompassing and expanding on the MDSec iOS Application (In)Security whitepaper. In this post, MDSec…
May 2nd, 2012
Written by: Admin
Mobile
Today MDSec released a whitepaper detailing some of the vulnerabilities we’ve observed over the past year while performing regular security assessments of iPhone and iPad applications. This whitepaper details some…
Apr 2nd, 2012
Written by: Admin
News
We recently had the pleasure of presenting at OWASP Ireland. The following talk discusses some of the issues we’ve identified during pentests that don’t easily slot in to the categories…
Apr 2nd, 2012
Written by: Admin
News
We recently had the pleasure of talking about iOS application security at OWASP Ireland, the slides for our presentation are below: iOS application (in)security
Feb 24th, 2012
Written by: Admin
News
MDSec are proud to announce the Web Application Hacker’s Handbook training course will be running at Countermeasure 2012! The course syllabus follows the chapters of the Second Edition of The…
Feb 2nd, 2012
Written by: Admin
News
We recently presented at the Manchester OWASP chapter on Evaluating iOS Applications. Thanks to everyone involved, it was a great evening. Our slides can be found below:Evaluating iOS Applications