TARLOGIC's BLOG
Cybersecurity - Page 12

Cybersecurity articles with security analysis and ethical hacking technics information

Platform in the Middle – Bypass DRM protections at Content Delivery Networks
Platform in the Middle – Bypass DRM protections at Content Delivery Networks

Please find below the description of the research about Platform in the Middle attacks carried out by Tarlogic and included in RootedCON 2015 congress. These attacks refer to Inter[...]

Read more
DSL Communications Interception – Introduction – Part 1
DSL Communications Interception – Introduction – Part 1

The purpose of this series of articles is to analyze communications analysis and interception strategies, specifically for DSL routers, through DSLAM devices, although it is equall[...]

Read more
MySQL stored procedures protection
MySQL stored procedures protection

Welcome to the new Tarlogic blog, where we will try to unroll technical articles focused on website security audits or cloud applications security and services deployment. In this [...]

Read more
1 9 10 11 12