Home
Contact us
Links
Disclaimer
Social Profiles
Popular Posts
Google opens a pharmacy? It’s spam of the day
MessageLabs Intelligence recently tracked a new pharmaceutical spam campaign promoting a supposedly "Google-accredited" onlin...
Citadel banking malware is evolving and spreading rapidly
IDG News Service - A computer Trojan that targets online banking users is evolving and spreading rapidly because its creators hav...
Cve-2010-1240 : Adobe Pdf Embedded Exe Social Engineering
Vulnerability discovered & disclosed by Didier Stevens the 2010-03-29 Exploit-DB PoC provided by Didier Stevens the 2010-03-31 PoC pr...
DEFCON 19: Jugaad -- Linux Thread Injection Kit
Speaker: Aseem "@" Jakhar Founder, null -- The open security community (registered non-profit organization) Windows malware ...
DEFCON 19: Insecurity: An Analysis Of Current Commercial And Government Security Lock Designs
Speakers: Marc Weber Tobias Investigative Attorney and Security Specialist, Security.org | Matt Fiddler Security Consultant | Tobias Blu...
Thursday, October 27, 2011
Using QR Tags To Attack Smart Phones
8:28 PM
Whitepapers
No comments
Whitepaper called Using QR Tags to Attack Smart Phones (Attaging). It discusses the threatscape related to arbitrary scanning of these tags and using Metasploit to exploit them.
Authored by Augusto Pereyra
Download
Email This
BlogThis!
Share to X
Share to Facebook
Newer Post
Older Post
Home
0 comments:
Post a Comment
0 comments:
Post a Comment