TL;DR The problem Have you ever found yourself in a client’s hardened, containerised environment where you needed to scan ...
TL;DR Introduction In the field of maritime cyber, we often cite the movie Speed 2: Cruise Control from 1997 as an ...
TL;DR Introduction It’s strange how satisfying it is to turn off the lights, set up a tent under the stars, and watch the ...
The Internet of Things (IOT); that huge network of everyday objects that can connect to the internet; able to “talk” to other devices and send information. Did you know your TV could be spying on you?
I’ve had a keen interest in the original RottenPotato and JuicyPotato exploits that utilize DCOM and NTLM reflection to perform privilege escalation to SYSTEM from service accounts. The applications ...
If you are distributing or selling smart devices in to the UK market, your products will need to be compliant with the UK Product Security and Telecommunications Act. The manufacturer must provide ...
If you went to our PTP Cyber Fest over the Infosec week you may have seen the PTP hack car being used as a games controller for the game SuperTuxKart (a free and open-source Mario Kart type game). You ...
CCTV is ubiquitous in the UK. A recent study estimates there are about 1.85m cameras across the UK – most in private premises. Most of those cameras will be connected to some kind of recording device, ...
Last year, about the time we were messing around with a virtually unheard-of hardware wallet we got a bit excited about the word “unhackable”. Long story short, I ended up supporting a selection of ...
Over the last year of looking at kids GPS tracking watches we have found some staggering issues. With these devices it almost seems that having multiple security issues is the new normal. While ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results