DEF CON 29 Aerospace Village - Panel: 'Hack-A-Sat 2: The Good, The Bad And The Cyber Secure' →
Our thanks to DEFCON for publishing their outstanding DEFCON 29 Aerospace Village videos on the organizations’ YouTube channel.
Our thanks to DEFCON for publishing their outstanding DEFCON 29 Aerospace Village videos on the organizations’ YouTube channel.
Our thanks to DEFCON for publishing their outstanding DEFCON 29 Aerospace Village videos on the organizations’ YouTube channel.
Our thanks to DEFCON for publishing their outstanding DEFCON 29 Aerospace Village videos on the organizations’ YouTube channel.
Our thanks to DEFCON for publishing their outstanding DEFCON 29 Aerospace Village videos on the organizations’ YouTube channel.
Our thanks to DEFCON for publishing their outstanding DEFCON 29 Aerospace Village videos on the organizations’ YouTube channel.
Our thanks to DEFCON for publishing their outstanding DEFCON 29 Aerospace Village videos on the organizations’ YouTube channel.
Our thanks to DEFCON for publishing their outstanding DEFCON 29 Aerospace Village videos on the organizations’ YouTube channel.
Our thanks to DEFCON for publishing their outstanding DEFCON 29 Aerospace Village videos on the organizations’ YouTube channel.
Our thanks to DEFCON for publishing their outstanding DEFCON 29 Aerospace Village videos on the organizations’ YouTube channel.
Our thanks to DEFCON for publishing their outstanding DEFCON 29 Aerospace Village videos on the organizations’ YouTube channel.
Thanks to 0xdade for publishing these outstanding Shmoocon 2020 Convention videos via the 0xdade YouTube channel and the 0xdade Shmoocon 2020 Playlist for everyone to view, learn and, of course, enjoy.
Based on outrage as to the marketing tactics of Amazon.com, Inc. (NASDAQ: AMZN) RING unit (and the serious flaws discovered weekly with this hardware home security solution), I predict significant lawfare targeting the company, for both it's privacy related SNAFUs (and the product line's deep security flaws) as well as it's aggressive and gratutities-laden marketing tactics (think the pharmaceutical industry in relation to doctors) targeting law-enforcement. Not too mention the obvious incompetence of the company's security oversight of RING as a line of business. Read All About It.
via Samuel K. Moore - writing for IEEE Spectrum Magazine - comes this outstanding article published on October 7th, 2019; in which, Mr. Moore details the application of well-known-and-leveraged X-Ray techniques (also known as Ptychographic X-Ray Laminography) to the functional reverse-engineering of chipsets. Today's MustRead! H/T
tremendous conference videos on their YouTube Channel
'Dubbed "SimJacker," the vulnerability resides in a particular piece of software, called the S@T Browser (a dynamic SIM toolkit), embedded on most SIM cards that is widely being used by mobile operators in at least 30 countries and can be exploited regardless of which handsets victims are using.' - via Mohit Kumar, writing at The Hacker News