BLOG

New image, same personality

October 16, 2020

During the last two years Layakk has experienced a transformation, from being a company purely centered on technical cybersecurity services, to also become a Laboratory officially accredited to perform security evaluations of IT products, conforming to Common Criteria (CC) and LINCE  methodologies. Some may be surprised to learn that…

Shell script “libraries”

December 19, 2014

  If you are a security profesional (or an IT profesional) probably you -like us- are constantly writing shell scripts, so that you can automate certain tasks in your linux (or unix) environment. We don’t usually use shell scripting to write complex applications (although some shell scripts become quite…

Book: Mobile communications Hacking and Security – SECOND EDITION

May 29, 2014

Back in november 2011 we published our first book about mobile communications security… After more than a thousand units sold, we are proud to announce that the second edition of the boook is available. During this two and a half years, like other researchers, we have maintained our activity…

3G Attacks at RootedCON 2014

March 26, 2014

Some time ago we learned that a subset of the attacks that were possible for 2G mobile communications using a fake base station were also possible in 3G, particularly: IMSI Catching: or how to know whether an IMSI is active in the range of the attacker’s base station Geo-location…