This talk by Stefan Widmann gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g.
The aim of this talk by Clemens Hopfer from the 30th Chaos Communication Congress is to give an understandable insight into wireless communication, using existing systems as examples on why there are different communication systems for different uses.
Symbolic Execution (SE) is a powerful way to analyze programs.
Password-based authentication is widely used today, despite problems with security and usability.
Several password replacement schemes have been suggested that use a visual code to log in.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.