Trends in 2019 for cybersecurity according to the show floor at the RSA Security ConferenceMar 12, 2019
Adiel Lizama 5 days agoData Broker and Privacy DataWhen surfing the Internet, everything we do generates information, from the videos we like, the songs we listen to, the pages we visit,...
A. KinghtJul 24, 2018The Hitchhiker's Guide to Hacking Connected Cars: Exploitation of a Telematics Control UnitIn our previous article, we set up and configured our rogue BTS with the preparation of our jump kit. Now, we’ll discuss exploitation....
A. KinghtJul 17, 2018The Hitchhiker's Guide to Hacking Connected Cars: The Devil's Details of TCU Init Scripts in AndroidA dissection of attacks resulting from faulty logic in the writing of init scripts in Telematics Control Units "Son, the greatest trick...
A. KinghtJul 10, 2018The Hitchhiker's Guide to Hacking Connected Cars: Evil Twin Attack Against a Connected CarIntroduction The emergence of drive-by-wire, in-vehicle sensors for ADAS, and connected infotainment has added massive complexity and...
A. KinghtJul 3, 2018The Hitchhiker's Guide to Hacking Connected Cars: The HEAVENS Security ModelOverview Before proceeding directly to performing threat modeling, it’s important to first define your risk management framework. The...
A. KinghtJun 26, 2018The Hitchhiker's Guide to Hacking Connected Cars: 5G Rising"The most exciting breakthroughs of the 21st century will not occur because of technology, but because of an expanding concept of what it...
A. KinghtJun 20, 2018Hitchhiker's Guide to Hacking Connected Cars: V2X Networks Demystified"Technological innovation is indeed important to economic growth and the enhancement of human possibilities" -Leon Kass The idea of...