This talk by Stefan Widmann gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g.
The aim of this talk by Clemens Hopfer from the 30th Chaos Communication Congress is to give an understandable insight into wireless communication, using existing systems as examples on why there are different communication systems for different uses.
Symbolic Execution (SE) is a powerful way to analyze programs.
Security researchers Andrew “bunnie” Huang and Sean “xobs” Cross have demonstrated that the only way to be absolutely sure that no one will be able to extract data from a SD memory card you used is to physically destroy it.
Password-based authentication is widely used today, despite problems with security and usability.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.