Explore >> Select a destination


You are here

github.blog
| | insinuator.net
9.1 parsecs away

Travel
| | Nowadays, Bluetooth is an integral part of mobile devices. Smartphones interconnect with smartwatches and wireless headphones. By default, most devices are configured to accept Bluetooth connections from any nearby unauthenticated device. Bluetooth packets are processed by the Bluetooth chip (also called a controller), and then passed to the host (Android, Linux, etc.). Both, the firmware on ...
| | securitylab.github.com
4.0 parsecs away

Travel
| | Improper validation of input data can lead to freed memory being accessible from the GPU, which can lead to arbitrary memory access.
| | www.riscure.com
11.4 parsecs away

Travel
| | In this series of blog posts about Samsung's TEE OS we identify vulnerabilities in tee security and show how to exploit them.
| | www.pcworld.com
41.8 parsecs away

Travel
| There is a serious security flaw in billions of Intel CPUs that can let attackers steal confidential data like passwords and encryption keys. Firmware updates can fix it, but at a potential significant performance loss.