top of page
1 min read
Bluetooth Hacking, January 21-23
Bluetooth Hacking is one of the most under-appreciated threats in our IoT World! For years, cybersecurity researchers considered...
1,619 views
5 min read
What is Data Compression and What Role Did it Play in the libwebp Cellphone Attack?
Welcome back, my aspiring cyberwarriors! Data compression makes the world go round! Well, almost. Without data compression our digital...
679 views
3 min read
What is Zigbee and Why is it Used Extensively in SCADA and IoT?
Welcome back, my aspiring cyberwarriors! As our digital world expands to greater and greater physical space, the need for a simple,...
467 views
4 min read
Bluetooth Hacking: Injecting Commands into a Bluetooth Device with BlueDucky
Welcome back, my aspiring cyberwarriors! Bluetooth is a nearly ubiquitous protocol used to communicate between devices in close proximity...
12,659 views
4 min read
Bluetooth Hacking, Part 1: Getting Started with Bluetooth
Welcome back, my aspiring cyberwarriors! Today, Bluetooth is built into nearly all our devices and gadgets. These include our ...
75,248 views
4 min read
Getting Started with Bluetooth Hacking
Today, Bluetooth is built into nearly all our gadgets. These include our computers, smartphones, iPods, tablets, speakers, game...
2,441 views
3 min read
Using MultiBlue to Control Any Bluetooth Mobile Device
We recently began an exploration of ways to hack using the Bluetooth protocol. As you know, Bluetooth is a protocol that connects near...
5,141 views
5 min read
BlueTooth Hacking, Part 2: BlueTooth Reconnaissance
The beauty of Bluetooth hacking is that it gives you a clear window into the world of the target. Nearly every device has Bluetooth...
40,198 views
3 min read
Bluetooth Hacking, Part 3: The BlueBourne Exploit
When BlueTooth was first introduced in 1994 by Ericcson Corporation of Sweden, it was very insecure. Hackers could steal information and...
52,959 views
bottom of page