Awake is a team of computer security experts in web and mobile
security, digital forensics, malware analysis,
cryptology and privacy-enhancing technologies.
Services we provide:
Hardware and IoT security
The number of our hardware-based projects is rapidly growing:
Internet of Things, Embedded systems,
Industrial Control Systems, Automotive, privacy-enhancing technologies for personal electronics
Nowadays it is essential to conduct regular security tests of your web, mobile and embedded applications,
data storages and corporate networks to reveal security weaknesses and risks.
Penetration testing simulates a real-world targeted attack but provides an opportunity to analyse its consequences in a safe and controlled manner.
Research & Development
Technology stacks and platforms often require accompanying research and evaluation.
For complex security systems there is often a need to develop custom software and hardware components.
We are open for a long-term collaboration on this.
These are the companies we had the pleasure to work with.
We have improved their security either by providing our services directly or collaborating via their bug bounty programs
During the time of our experience in computer security we came up with these rules.
- No bullshit rule: We call a spade a spade. There is nothing ambiguous about our services.
- "Paper security" rule: Convincing bureaucracy doesn`t reflect the actual security posture by itself. The goal of security testing is to find real vulnerabilities.
- Holding many corporate and individual computer security certifications is fine but we consider participation in CTFs, bug
bounty achievements and practical research results as more valuable indices of skills.
- Everybody makes mistakes. We will admit ours and fix them