资讯
Introduction Over the years we have been fortunate to have been called upon to help with some challenging investigations.
Enhance your organisation's password security with Pen Test Partners' PAPA service. Identify weak credentials by securely ...
We help keep money in the banks, planes in the sky, and the lights on.
Threat modeling works to identify, communicate, and understand threats and mitigations within the context of protecting something of value. A threat model is a structured representation of all the ...
Key relay attacks against keyless entry vehicles are well known. Many 3 rd party car alarm vendors market themselves as solutions to this. We have shown that fitting these alarms can make your vehicle ...
Over the last 18 months, we’ve been investigating the security of smart electric vehicle chargers. These allow the owner to remotely monitor and manage the charge state, speed and timing of their car ...
Sometimes, our jaws hit the floor. We see some pretty bad things in IoT security, but this has to take the biscuit. After the WeVibe lawsuit and settlement, we started looking at the security of IoT ...
Many organisations are turning to virtualisation of apps and desktops. This often involves virtualisation platforms such as Citrix to deliver these services. Get your configuration or lock-down wrong ...
One of my favourite sorts of hardware hacking is making a device do something it was never intended for. It’s creative, disruptive, and fun. Everyone has their own way of going about things. Different ...
For years we’ve been trying to set fire to ‘smart’ things by hacking them. We got some charring on the iKettle, but nothing more. Then we found some smart hair straighteners. The Glamoriser ...
A complex, challenging reverse and hijack of a toy tank Nerf gun camera, but the result was we got to shoot the 44Con conference organiser with it! A remote-controlled Nerf gun with video feed and ...
Building a secure IoT system requires secure IoT devices, and building a secure IoT device requires a strong foundation. The hardware in the device must support and ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果