|
You are here |
blog.thalium.re | ||
| | | | |
www.riscure.com
|
|
| | | | | In this series of blog posts about Samsung's TEE OS we identify vulnerabilities in tee security and show how to exploit them. | |
| | | | |
insinuator.net
|
|
| | | | | Nowadays, Bluetooth is an integral part of mobile devices. Smartphones interconnect with smartwatches and wireless headphones. By default, most devices are configured to accept Bluetooth connections from any nearby unauthenticated device. Bluetooth packets are processed by the Bluetooth chip (also called a controller), and then passed to the host (Android, Linux, etc.). Both, the firmware on ... | |
| | | | |
www.anvilsecure.com
|
|
| | | | | I reversed the firmware of my Garmin Forerunner 245 Music back in 2022 and found a dozen or so vulnerabilities in their support for Connect IQ applications. They can be exploited... | |
| | | | |
linkage.lol
|
|
| | | Info on the DNS service, VPN, Firewall, Real-Time Protection and Ad-Blocker I use on my Mac to stay safe. | ||