Reverse Engineering a Philips TriMedia CPU based IP Camera – Part 3
Introduction Welcome to the final chapter of the Trimedia series. In the first part of the series, I introduced this...
Introduction Welcome to the final chapter of the Trimedia series. In the first part of the series, I introduced this...
Introduction After detailing Samsung's TrustZone implementation in the first part of this series, this blog post introduces the tools that...
Motivations After a general introduction on the ARM TrustZone and a focus on Qualcomm's implementation, this new series of articles...
Introduction This blog post deals with the Legu packer, an Android protector developed by Tencent that is currently one of...
Introduction Irma is our file security analysis software, originally developed as an open source project with the sponsorship of 5...
Uzbekistan plans to legalize mining by providing the status of a participant in the mining pool, which is planned to...
The EU (Europian Union) is considering restricting the use of facial recognition technology for a possible duration of 5 years,...
Undoubtedly, being an "Adult Webcam Model" means living a "revealing" life "out in the open". But to an extent where...
Scallion lets you create vanity GPG keys and .onion addresses (for Tor's hidden services) using OpenCL.Scallion runs on Mono (tested...
Bluewall is a firewall framework designed for offensive and defensive cyber professionals. This framework allows Cybersecurity professionals to quickly setup...