Introduction In the previous articles (ZigBee Security: Basics (Parts 1 & 2)) provided a brief overview of the ZigBee protocol and its security features. ZigBee

Introduction In the previous articles (ZigBee Security: Basics (Parts 1 & 2)) provided a brief overview of the ZigBee protocol and its security features. ZigBee
Introduction ZigBee is an open-source wireless technology used in low-powered embedded devices (radio systems) to facilitate efficient and effective machine-to-machine communication (typically 10-100 meters apart)
Industrial control systems (ICS) made the headlines a few times lately due to their importance in critical infrastructures (power plants, oil, gas, nuclear plants, etc.)
Containers have been around for decades, but their adoption has gained momentum quite recently. A container is a software solution that provides an additional layer
Summary On October 16th, several vulnerabilities affecting the Wi-Fi Protected Access II (WPA2) protocol were disclosed by security researchers in coordination with the U.S CERT.
Co-authored by tmlxs and adr13n WireGuard is a network tunnel (VPN) for IPv4 and IPv6 that uses UDP. Currently most of the code resides in the Linux kernel but