|
You are here |
comsecuris.com | ||
| | | | |
googleprojectzero.blogspot.com
|
|
| | | | | Posted by Mateusz Jurczyk of Google Project Zero This post series is about how we used at-scale fuzzing to discover and report a tot... | |
| | | | |
raelize.com
|
|
| | | | | Raelize provides top-notch embedded device security serrvices like consultancy, testing, research and training. | |
| | | | |
insinuator.net
|
|
| | | | | Nowadays, Bluetooth is an integral part of mobile devices. Smartphones interconnect with smartwatches and wireless headphones. By default, most devices are configured to accept Bluetooth connections from any nearby unauthenticated device. Bluetooth packets are processed by the Bluetooth chip (also called a controller), and then passed to the host (Android, Linux, etc.). Both, the firmware on ... | |
| | | | |
mjanja.ch
|
|
| | | Learning about the Linux kernel by hacking on the Eudyptula Challenge. | ||