Cybersecurity

Bluetooth BLUFFS attacks

Almost all modern versions of bluetooth are hackable via BLUFFS attacks. CVE-2023-24023 Detail https://nvd.nist.gov/vuln/detail/CVE-2023-24023 Bluetooth BR/EDR devices with Secure Simple Pairing and Secure Connections pairing in Bluetooth Core Specification 4.2 through 5.4 allow certain man-in-the-middle attacks that force a short key length, and might lead to discovery of the encryption key and live injection, aka

Embedded systems and IoT security technical article

I wrote a technical article on embedded systems and IoT security to Uusiteknologia.fi magazine: Designing modern electronics+ information security With the latest smart electronics and embedded microprocessors, devices connected to the network can be implemented even better, but even better care must be taken of their data security and protections. This Designing modern electronics article

The History of IoT Security

There’s a significant danger that the rapid pace of IoT advancement is potentially outstripping the development of the IoT security infrastructure. The Internet of Things may sound like a recent phenomenon but its roots can be traced back to the 19th Century. In fact, the concept of connected devices dates back to 1832. Read more

Fun: Cut the cable

For network safety? You might have seen earlier this picture at https://9gag.com/tag/firewall/fresh or many other sites. You can’t hack an air gap! That seems to be real. Not a fake meme. That was a special run of cable made specifically for the OHM conference in 2013 https://www.bit.nl/news/115/88/Cut-here-to-activate-firewall-layer-1-firewalls-op-OHM2013. There is picture in Pinterest and Starecat of