The J-Link debugger sold by Segger is a debugger probe for ARM Cortex-M processors like the …
Category: Guide
A Guide to Bluetooth Man-In-The-Middle (MITM)
One of the more challenging aspects of Bluetooth security is dealing with practical attacks. Man-In-The-Middle attacks …
Read More from A Guide to Bluetooth Man-In-The-Middle (MITM)
Integrating MbedTLS by Example
Adding MbedTLS to your project is a great way to leverage a library designed to help …
Using OpenSSL for Securing Bluetooth and Wireless Devices
In the rapidly evolving world of embedded systems, security has become a paramount concern. With the …
Read More from Using OpenSSL for Securing Bluetooth and Wireless Devices
Building BlueZ – For Defense and Offense
What’s BlueZ BlueZ is an open-source Bluetooth stack implementation for Linux-based operating systems. The stack implementation …
Extracting Firmware from EEPROM, Flash and eMMC
We’ve previously covered some of the best tools for reversing firmware that you should be using, …
Read More from Extracting Firmware from EEPROM, Flash and eMMC
Firmware Reversing and Analysis Tools
Firmware sits at the core of almost every electronic product today. It’s at the heart of …
Bluetooth Security Primer – Classic + BLE
Background Bluetooth is one of the most popular wireless protocols for devices. Maybe the biggest reason …
Top 10 Wireless Security Issues
Wireless systems spread the gamut from narrowband single channel transmitters to multi-gigabit Wi-Fi using OFDMA and …
Wireless Security Challenges
Wireless devices are all around us. We rely on them for everything we do, from opening …