Explore >> Select a destination


You are here

blog.quarkslab.com
| | insinuator.net
2.6 parsecs away

Travel
| | Nowadays, Bluetooth is an integral part of mobile devices. Smartphones interconnect with smartwatches and wireless headphones. By default, most devices are configured to accept Bluetooth connections from any nearby unauthenticated device. Bluetooth packets are processed by the Bluetooth chip (also called a controller), and then passed to the host (Android, Linux, etc.). Both, the firmware on ...
| | sergioprado.blog
3.6 parsecs away

Travel
| | This is the second part of the article about embedded Linux security.
| | blog.thalium.re
3.0 parsecs away

Travel
| | [AI summary] The blog post discusses the author's experience in vulnerability research and exploitation targeting Steam and its related products, including Steam Link and Remote Play. It covers various vulnerabilities such as format string vulnerabilities, request forgery, heap overflows, and a remote code execution (RCE) exploit. The author also details their interactions with HackerOne and Valve, highlighting the challenges in getting timely responses and the eventual resolution of the reported issues.
| | blog.evanricafort.com
22.8 parsecs away

Travel
| Information Security and Personal blog