BLOG

CyberSecurity Act in 5 minutes

16 November 2020

  Understand the new European regulation on security certification Our Product Security Evaluation Laboratory (accredited in both Common Criteria and LINCE methodologies) always tries to take care of the complexity of the certification processes, so that it becomes a much simpler task for our customers. With that approach, we…

New image, same personality

16 October 2020

During the last two years Layakk has experienced a transformation, from being a company purely centered on technical cybersecurity services, to also become a Laboratory officially accredited to perform security evaluations of IT products, conforming to Common Criteria (CC) and LINCE  methodologies. Some may be surprised to learn that…

Shell script “libraries”

19 December 2014

  If you are a security profesional (or an IT profesional) probably you -like us- are constantly writing shell scripts, so that you can automate certain tasks in your linux (or unix) environment. We don’t usually use shell scripting to write complex applications (although some shell scripts become quite…

Book: Mobile communications Hacking and Security – SECOND EDITION

29 May 2014

Back in november 2011 we published our first book about mobile communications security… After more than a thousand units sold, we are proud to announce that the second edition of the boook is available. During this two and a half years, like other researchers, we have maintained our activity…