My notes on the Ashley Madison leak

It finally happened. Impact Team came good on their claim and released the data obtained from the Ashley Madison data breach exactly 30 days ago today. The implications here are »

Owning Philips In.Sight IP Cameras

This is a continuation from my previous post but this time we'll be taking a look at the device itself, the Philips In.Sight M100. The end goal is to »

Yoics: account takeover vulnerability

Yoics market themselves as "secure cloud networking" and is a service that allows you to "Internet access (almost) anything". Many top brands use Yoics in their devices; Cisco, Astak, Philips »

Moonpig vulnerability

Moonpig are one of the most well known companies that sell personalised greeting cards in the UK. In 2007 they had a 90% market share and shipped nearly 6 million »

Introducing Bhoot

Got root? Get Bhoot! I've just created an Android app that allows you to upload and convert your favourite GIFs in to Android boot animations. or browse what the community »

National Express print-at-home vulnerability

This is a fine example of developers being lazy and how not to implement "security". National Express are one of the biggest public transport companies in the UK with a »

Why I'm excited about C# 6.0

Version 6.0 has been out since April via the new .NET compiler, Roslyn and will soon ship with Visual Studio 14 so let's have a super-quick run down of »

NLog.Slack - love your logs

I love Slack. It's the most amazing thing since sliced bread. Yeah, that good. It's so good that it is the first service I've paid for that also offers a »

APK Downloader

This was a part of the APIfy service which is now defunct. I would now recommend using this downloader. If you're interested in the technical side of things drop me »

Cerberus anti-theft – an exploit allowing you to access any device

You may or may not have heard of Cerberus, an anti-theft application for Android devices. Cerberus allows you to remotely control your device if it has been lost or stolen. »