Editor's Pick

Beyond Root: Custom Firmware for Embedded Mobile Chips

In this DEFCON presentation, Christopher Wade shows us his methods for extracting, analysing, and abusing a Samsung bootloader to create custom firmware for his mobile phone.

4 lesser-known attack types

Being aware of the threats that lurk out there is mandatory in order to know... Read more

Build a virtual private network with Wireguard and Fedora

Wireguard is a new VPN designed as a replacement for IPSec and OpenVPN. Its... Read more

Have you been pwned?

Have your passwords been exposed online? Although you should be using a... Read more

This site only uses cookies that are essential for the functionality of this website. Cookies are not used for tracking or marketing purposes.

By using our site, you acknowledge that you have read and understand our Privacy Policy, and Terms of Service.