Security Explorations conducts security and vulnerability research with respect to the most challenging software security technologies.
AG Security Research is responsible for the commercial part of our activity. Visit the website and learn more about our core competences.
Security Explorations conducted security analysis of Microsoft Warbird and Protected Media Path technologies (...)
Security Explorations discovers multiple security vulnerabilities in Telit Cinterion IoT modem gateway devices (...)
During our research efforts, we investigate in detail security of a target software or technology in order to find weaknesses in its design and implementation.
Our research was featured over 200 times in various digital and printed media publications. This includes renown media outlets and international technical news portals.
(…) security researchers at the Polish firm Security Explorations revealed another critical security flaw in Java that affects users of every browser that runs the plugin, including Chrome, Firefox, Safari and Internet Explorer, allowing a malicious hackers to gain complete control of a victim's machine through a rigged website.
A new zero-day exploit in multiple versions of Java puts roughly 1 billion users at risk to attackers and malicious code. The flaw was discovered by researchers at Poland's Security Explorations, a security firm that already has a known penchant for unearthing flaws in Java's notoriously buggy programming language.
Reuters reports that Adam Gowdiak, Java security expert at Security Explorations, says Oracle's update leaves "several critical security flaws" unfixed. "We don't dare to tell users that it's safe to enable Java again," Gowdiak told Reuters.
Oracle issued an emergency fix today for vulnerabilities in its Java software about four months after Security Explorations, a security firm, warned the company about the bugs. The delay in providing a fix allowed more than 100,000 computers to get hacked, security firm FireEye estimated. So why did it take this long to provide a patch?
Have questions? We encourage you to contact us by e-mail.