At the beginning of last year, we had an ambitious project idea, to consider the security of Mobile Point of Sales terminals. This project started with just a two card readers and accounts. This quickly grew into a project involving seven card readers and four vendors across many different regions.
44CON takes place annually in London, UK. This year it took place from 12-14th September. This was my first time in attendance, both as a speaker and a CTF participant. I'm still a n00b to offensive security and to date had not participated in a CTF. I decided to give
Kiosk mode is a mode within an operating system or application which limits the users access to the rest of the system. Typically, a user will be able to access and interact with only one application. We’ve all interacted with ATM’s and self-check-out desks, these are just two
On the 16th of June, HackerOne paid out over $80,000 in rewards during their first London meetup. Bug bounties are big business, and for good reason. Bug bounty programs incentivise security researchers to report security issues in an organised manner. Not only do they compensate researchers, they also drive
Given the high level of interaction we all have payments every day; how is it that we don’t know more about payment technologies? I want to change that. I am going to shed a little light on payments for everyone. So in this article, the first in a series,