Learn
Is Owning a BLEShark Nano Legal?
Yes, owning a BLEShark Nano is legal. The distinction between possessing a tool and using it without authorization matters.
Is Owning a BLEShark Nano Legal?
Yes, owning a BLEShark Nano is legal. The distinction between possessing a tool and using it without authorization matters.
Penetration Testing Laws: CFAA and Computer Mis...
The CFAA (US) and Computer Misuse Act (UK) define unauthorized access. Here's what they say and how pentesters navigate them.
Penetration Testing Laws: CFAA and Computer Mis...
The CFAA (US) and Computer Misuse Act (UK) define unauthorized access. Here's what they say and how pentesters navigate them.
Responsible Use of Wireless Security Tools Legally
Owning security tools is legal. Using them on networks you don't own isn't. Here's the legal framework you need to know.
Responsible Use of Wireless Security Tools Legally
Owning security tools is legal. Using them on networks you don't own isn't. Here's the legal framework you need to know.
Amateur Radio (HAM) Basics
A HAM license allows higher power and more frequencies. Here's the licensing system and where it overlaps with security research.
Amateur Radio (HAM) Basics
A HAM license allows higher power and more frequencies. Here's the licensing system and where it overlaps with security research.
What Frequencies Are Legal to Use Without a Lic...
The ISM and UNII bands let you transmit without a license. Here's exactly which frequencies are available and the rules.
What Frequencies Are Legal to Use Without a Lic...
The ISM and UNII bands let you transmit without a license. Here's exactly which frequencies are available and the rules.
WiFi Transmit Power Limits by Region
Maximum WiFi transmit power varies by country and band. Here's the global picture and why it matters for portable tools.
WiFi Transmit Power Limits by Region
Maximum WiFi transmit power varies by country and band. Here's the global picture and why it matters for portable tools.
FCC Part 15: Unlicensed Radio Devices Explained
Every WiFi router, Bluetooth device, and wireless security tool operates under FCC Part 15. Here are the actual rules.
FCC Part 15: Unlicensed Radio Devices Explained
Every WiFi router, Bluetooth device, and wireless security tool operates under FCC Part 15. Here are the actual rules.
CE Marking Explained for Electronic Devices
CE marking means a product meets EU directives. Here's what it actually certifies and what it doesn't.
CE Marking Explained for Electronic Devices
CE marking means a product meets EU directives. Here's what it actually certifies and what it doesn't.
What Is the EU RED (Radio Equipment Directive)?
The EU RED governs all radio equipment sold in Europe. Its 2022 cybersecurity additions directly affect tools like the BLEShark Nano.
What Is the EU RED (Radio Equipment Directive)?
The EU RED governs all radio equipment sold in Europe. Its 2022 cybersecurity additions directly affect tools like the BLEShark Nano.
What Is the FCC and Why Does It Matter for Secu...
The FCC regulates every radio device sold in the US. Here's what Part 15 means and why it matters for security tools.
What Is the FCC and Why Does It Matter for Secu...
The FCC regulates every radio device sold in the US. Here's what Part 15 means and why it matters for security tools.
DNS Hijacking Campaigns
DNS hijacking redirects entire domains to attacker-controlled servers. Here are the major campaigns and how they worked.
DNS Hijacking Campaigns
DNS hijacking redirects entire domains to attacker-controlled servers. Here are the major campaigns and how they worked.
Supply Chain Attacks on Router Firmware
VPNFilter infected 500,000 routers. Compromised firmware updates have been found in the wild. Here are the cases.
Supply Chain Attacks on Router Firmware
VPNFilter infected 500,000 routers. Compromised firmware updates have been found in the wild. Here are the cases.
Credential Harvesting via Captive Portals: Docu...
Fake captive portals that mimic hotel WiFi or airport login pages have captured real credentials. Here are the documented cases.
Credential Harvesting via Captive Portals: Docu...
Fake captive portals that mimic hotel WiFi or airport login pages have captured real credentials. Here are the documented cases.
Hijacking Smart TVs With IR: The Research
Smart TVs accept IR commands with no authentication. Researchers have used this to change settings, inject content, and more.
Hijacking Smart TVs With IR: The Research
Smart TVs accept IR commands with no authentication. Researchers have used this to change settings, inject content, and more.
Bluetooth Attacks on Vehicles
From infotainment system access to keyless entry relay attacks - how Bluetooth vulnerabilities affect modern vehicles.
Bluetooth Attacks on Vehicles
From infotainment system access to keyless entry relay attacks - how Bluetooth vulnerabilities affect modern vehicles.
BLE Tracker Stalking: Real Cases and the Response
AirTags and Tile trackers have been used for stalking. Here are the cases, the industry response, and what gaps remain.
BLE Tracker Stalking: Real Cases and the Response
AirTags and Tile trackers have been used for stalking. Here are the cases, the industry response, and what gaps remain.
AirDrop Privacy Leaks and Abuse Cases
AirDrop's contact matching leaked partial hashes of phone numbers and emails. Plus the cyber flashing problem.
AirDrop Privacy Leaks and Abuse Cases
AirDrop's contact matching leaked partial hashes of phone numbers and emails. Plus the cyber flashing problem.
HID Injection Malware in the Wild
HID injection attacks have moved from research talks to real-world incidents. Here are the documented cases.
HID Injection Malware in the Wild
HID injection attacks have moved from research talks to real-world incidents. Here are the documented cases.
DEF CON Wall of Sheep: Conference WiFi Attacks
The Wall of Sheep displays credentials captured from DEF CON attendees using insecure protocols. Even security pros get caught.
DEF CON Wall of Sheep: Conference WiFi Attacks
The Wall of Sheep displays credentials captured from DEF CON attendees using insecure protocols. Even security pros get caught.
Evil Twin Attacks at Airports: Documented Cases
Real cases of evil twin attacks in airports and transit hubs - what happened, what was captured, and what the research shows.
Evil Twin Attacks at Airports: Documented Cases
Real cases of evil twin attacks in airports and transit hubs - what happened, what was captured, and what the research shows.
The Target Breach: How an HVAC Vendor Exposed 4...
A compromised HVAC vendor's network credentials gave attackers a path to Target's POS systems and 40 million cards.
The Target Breach: How an HVAC Vendor Exposed 4...
A compromised HVAC vendor's network credentials gave attackers a path to Target's POS systems and 40 million cards.
NotPetya: The Most Destructive Cyberattack in H...
NotPetya masqueraded as ransomware but was actually a wiper. It caused $10 billion in damages through a software update.
NotPetya: The Most Destructive Cyberattack in H...
NotPetya masqueraded as ransomware but was actually a wiper. It caused $10 billion in damages through a software update.
WannaCry: The Ransomware That Used a WiFi-Adjac...
WannaCry spread via EternalBlue through SMB, hitting 200,000+ systems in 150 countries in a single weekend.
WannaCry: The Ransomware That Used a WiFi-Adjac...
WannaCry spread via EternalBlue through SMB, hitting 200,000+ systems in 150 countries in a single weekend.
The Mirai Botnet: How It Changed IoT Security F...
Mirai scanned for IoT devices with default credentials and built a botnet that took down half the internet.
The Mirai Botnet: How It Changed IoT Security F...
Mirai scanned for IoT devices with default credentials and built a botnet that took down half the internet.