BLOG

Nueva imagen, misma personalidad

16 octubre 2020

En los últimos dos años Layakk se ha transformado, pasando de ser una empresa centrada en servicios de ciberseguridad puramente técnicos, a ser además un laboratorio acreditado oficialmente para realizar evaluaciones de la seguridad de productos TIC, conforme a las metodologías Common Criteria (CC) y LINCE. A algunos les…

Shell script «libraries»

19 diciembre 2014

  If you are a security profesional (or an IT profesional) probably you -like us- are constantly writing shell scripts, so that you can automate certain tasks in your linux (or unix) environment. We don’t usually use shell scripting to write complex applications (although some shell scripts become quite…

Book: Mobile communications Hacking and Security – SECOND EDITION

29 mayo 2014

Back in november 2011 we published our first book about mobile communications security… After more than a thousand units sold, we are proud to announce that the second edition of the boook is available. During this two and a half years, like other researchers, we have maintained our activity…

3G Attacks at RootedCON 2014

26 marzo 2014

Some time ago we learned that a subset of the attacks that were possible for 2G mobile communications using a fake base station were also possible in 3G, particularly: IMSI Catching: or how to know whether an IMSI is active in the range of the attacker’s base station Geo-location…