So a while back, @drakkhen and I were chatting and he suggested a simple device that would let him “airgap” his mobile devices from his computer but still use them for power. Like a “Charge-Only” USB cable but in an “adapter” form that you could use on normal USB Cables (the only previous alternative was […]
We took our “ARM Exploitation” course to Iceland at the request of old friends. We’ve long admired some of the Iceland guys, so we decided to go. NordicSec was a small conference but pretty dense in talent/skill. Our class was small but that was to be expected. It was great though to see so many […]
For the last few years on this blog we’ve been publishing more and more about embedded systems. We started with “Disassembling Blackberry Apps” which (to this day) we still get emails about thanking us for the disassembler patches we released. A few years back as Ridley was getting into “hardware hacking” and attacking embedded systems […]
“Case turned on the tensor beside the Hosaka. The crisp circle of light fell directly on the Flatline’s construct. He slotted some ice, connnected the construct, and jacked in. It was exactly the sensation of someone reading over his shoulder. He coughed. “Dix? McCoy? That you man?” His throat was tight. “Hey, bro,” said a directionless […]
We haven’t done posts in a while. We’ve had quite few in the magazine for some time now, but have done a poor job of doing updates. We’ve been really busy lately but wanted to let folks know what we plan to do for more of 2013. So far this year we taught ARM Exploitation […]
March 21, 2013
by slawlerguy
Late last year we got an email from Paul Such (the founder of SCRT Information Security) inviting us to present and lead a workshop at the Insomni’hack 2013 conference. A workshop is like a 1-day, mini-training. The conference is a two-track one day conference with workshops beforehand, and an all-night hacking contest and CTF afterwards. Maybe this […]
September 12, 2013
by s7ephen
0