Sign up to receive whitepapers direct to your inbox

 
  1. Image for Security of Things: An Implementers’ Guide to Cyber-Security for Internet of Things Devices and Beyond

    Security of Things: An Implementers’ Guide to Cyber-Security for Internet of Things Devices and Beyond

    This white paper outlines a set of practical and pragmatic security considerations for organisations designing, developing and, testing Internet of things (IoT) devices and solutions.

    View White Paper
  2. Image for USB attacks need physical access right? Not any more...

    USB attacks need physical access right? Not any more...

    This paper provides step-by-step instructions, showing how to remotely trigger a Windows-based USB bug by using a combination of open source hardware, open source software and new functionality provided by Microsoft RDP server.

    View White Paper
  3. Image for CANimation: Highlighting security threats to automotive systems

    CANimation: Highlighting security threats to automotive systems

    For the cars of today and the future the concerns around security are moving further into the realms of cyber security.

    View Presentation
  4. Image for BlackHat Asia USB Physical Access

    BlackHat Asia USB Physical Access

    NCC Group Research Director Andy Davis presented 'USB Attacks Need Physical Access Right? Not Any More...' at this year's BlackHat Asia in Singapore.

    View Presentation
  5. Image for Nessus Authenticated Scan - Local Privilege Escalation

    Nessus Authenticated Scan - Local Privilege Escalation

    Title: Nessus Authenticated Scan - Local Privilege EscalationRelease Date: 20 March 2014Reference: NGS00643Discoverer: Neil JonesVendor: TenableVendor Reference: RWZ-21387-181Systems Affected: Ness...

    View Resource
  6. Image for iOS 7 arbitrary code execution in kernel mode

    iOS 7 arbitrary code execution in kernel mode

    Title: iOS 7 arbitrary code execution in kernel modeRelease Date: 14 March 2014Reference: NGS00596Discoverer: Andy DavisVendor: AppleVendor Reference: 600217059Systems Affected: iPhone 4 and later,...

    View Resource
  7. Image for Application Layer Attacks – The New DDoS Battleground

    Application Layer Attacks – The New DDoS Battleground

    In this paper we discuss how being prepared and knowing how your current DDoS mitigation solution and procedures will respond to attacks is vital.

    View White Paper
  8. Image for Mobile web performance

    Mobile web performance

    These slides come from Andy Davies' presentation from the NCC Group Website Performance and Optimisation Day.

    View Presentation
  9. Image for Apple CoreAnimation Heap Overflow

    Apple CoreAnimation Heap Overflow

    Title: Apple CoreAnimation Heap OverflowRelease:  Date 3 March 2014Reference:  NGS00550Discoverer:  Karl SmithVendor:  AppleVendor Reference:  15229587Systems Affected:  OS X Mountain Lion v10.8.5,...

    View Resource
  10. Image for Preparing for Cyber Battleships – Electronic Chart Display and Information System Security

    Preparing for Cyber Battleships – Electronic Chart Display and Information System Security

    In this paper, we discuss the results of a research project looking at the security risks and weaknesses within Electronic Chart Display and Information Systems (ECDIS) , an information technology product used by the maritime industry.

    View White Paper