Our services
We are a team of passionate and experienced technical specialists and our job is to ensure that applications and infrastructures work as well as possible. In all our work we are driven by a limitless passion for quality.
We are a team of passionate and experienced technical specialists and our job is to ensure that applications and infrastructures work as well as possible. In all our work we are driven by a limitless passion for quality.
Our ethical hackers have found vulnerabilities in three charging stations. They demonstrated that the stations can be relatively easily taken over via Bluetooth. They presented the technical details at the major international hacker conference Black Hat.
After successfully identifying multiple vulnerabilities in macOS, the research team at Computest Security has now found a significant vulnerability in Windows 11.
Colleague Thijs Alkemade has once again found a 'process injection' vulnerability in the macOS operating system. After his report, Apple has addressed the vulnerability, and Thijs is now sharing all the technical details.
DORA has a significant impact on organizations within the financial sector and beyond. By better managing IT risks, they must become more resilient to cyber threats. Is your organization also facing the requirements of DORA?
To better protect users against risks, European legislation is forthcoming: the Cyber Resilience Act (CRA), which imposes strict requirements on IoT products. What does this law entail exactly and what should a manufacturer, importer or supplier consider?
Would you like to follow us on social media? Choose your favourite platform:
No worries! We only send one when we really have something to say.
Enter your email address and we will mail you as soon as possible.