BlueToolkit is an open-source tool that helps find security flaws in Bluetooth Classic devices. It runs known and custom exploits…
I think a big part of a person’s strengths is knowing how to properly handle his/her weaknesses. In my case,…
The Internet of Things (IoT) has become a major part of daily life. Smartphones, smart thermostats, security cameras, and other…
Across Australia, telemetry and industry sources indicate that the number of local ransomware attacks are on the rise while average…
I tend to shy away from groupthink oriented idealogies, but ocassionally I am stricken by a concept that is worth…
One of the coolest things in Firefox is its ability to do Google searches via the address bar; I use…
A URL is a subtype of URI that includes a protocol, like FTP or HTTP Updated: October 10, 2023 URI…
As I covered to some degree in an earlier post, quicksearches are quite sick. They let you search sites from…
HijackLoader, a malware loader first identified in 2023, has undergone significant evolution with the addition of new modules designed to…
Well, I just passed the final exam for the GIAC GSEC credential from SANS, and I have to say it’s…
Witnesses at a House hearing on medical device cybersecurity Tuesday called out the need for more proactive tracking of products…
A critical vulnerability has been identified in the Plantronics Hub software, a client application commonly used to configure Plantronics audio…











