Explore >> Select a destination


You are here

blog.quarkslab.com
| | insinuator.net
2.9 parsecs away

Travel
| | Nowadays, Bluetooth is an integral part of mobile devices. Smartphones interconnect with smartwatches and wireless headphones. By default, most devices are configured to accept Bluetooth connections from any nearby unauthenticated device. Bluetooth packets are processed by the Bluetooth chip (also called a controller), and then passed to the host (Android, Linux, etc.). Both, the firmware on ...
| | gamozolabs.github.io
6.1 parsecs away

Travel
| | I blog about random things security, everything is broken, nothing scales, shared memory models are flawed.
| | keenlab.tencent.com
3.4 parsecs away

Travel
| | In the past two years, Keen Security Lab did in-depth research on the security of Tesla Cars and presented our research results on Black Hat 2017 and Black Hat 2018. Our research involves many in-veh
| | blog.eclecticiq.com
23.0 parsecs away

Travel
| Arda Buyukkaya reveals how the Black Basta Ransomware-as-a-Service (RaaS) group used an automated brute forcing framework to target edge network devices of its victims.