From Bluesnarfing to KNOB: Navigating the Bluetooth Security Landscape Kurapati Purna Siri2024-11-18T17:19:30+05:30Bluetooth is a popular wireless technology that allows short-range data sharing between devices like smartphones, laptops, and IoT gadgets. It operates within a range of 10 to 100 meters and at frequencies between 2.4 and 2.485 GHz. While Bluetooth offers several benefits and advantages, Bluetooth has notable vulnerabilities within [...] FacebookTwitterLinkedInEmail November 18, 2024 Read more...
The Importance of Hashing Techniques in Cybersecurity Kurapati Purna Siri2024-09-09T17:14:40+05:30Hashing is a crucial concept in cybersecurity for maintaining data integrity and security. Unlike encryption, which allows data to be encrypted and decrypted, hashing is a one-way function that converts input data into a fixed-length, seemingly random string. Applications of Hashing in Cyber Security Hashing has a wide array of applications [...] FacebookTwitterLinkedInEmail September 9, 2024 Read more...
The Various Facets of IoT Firmware Analysis Kurapati Purna Siri2024-01-17T14:11:00+05:30 Firmware is a code or software on the device that allows and enables the device to perform various tasks. The most common architectures for IoT firmware devices are ARM and MIPS. Firmware provides the necessary instructions on how to communicate with hardware. Firmware is held in non-volatile memory devices such [...] FacebookTwitterLinkedInEmail July 11, 2022 Read more...