Learn

Filter
Is It Legal? - Ownership vs unauthorized use

Is Owning a BLEShark Nano Legal?

7 min read 1626 words 1 week ago

Yes, owning a BLEShark Nano is legal. The distinction between possessing a tool and using it without authorization matters.

2 comments

Is Owning a BLEShark Nano Legal?

7 min read 1626 words 1 week ago

Yes, owning a BLEShark Nano is legal. The distinction between possessing a tool and using it without authorization matters.

2 comments
CFAA - The law behind authorized access

Penetration Testing Laws: CFAA and Computer Mis...

9 min read 1958 words 1 week ago

The CFAA (US) and Computer Misuse Act (UK) define unauthorized access. Here's what they say and how pentesters navigate them.

Penetration Testing Laws: CFAA and Computer Mis...

9 min read 1958 words 1 week ago

The CFAA (US) and Computer Misuse Act (UK) define unauthorized access. Here's what they say and how pentesters navigate them.

Legal Use - Authorization is everything

Responsible Use of Wireless Security Tools Legally

8 min read 1816 words 1 week ago

Owning security tools is legal. Using them on networks you don't own isn't. Here's the legal framework you need to know.

Responsible Use of Wireless Security Tools Legally

8 min read 1816 words 1 week ago

Owning security tools is legal. Using them on networks you don't own isn't. Here's the legal framework you need to know.

HAM Radio - Licensed RF experimentation

Amateur Radio (HAM) Basics

8 min read 1814 words 1 week ago

A HAM license allows higher power and more frequencies. Here's the licensing system and where it overlaps with security research.

Amateur Radio (HAM) Basics

8 min read 1814 words 1 week ago

A HAM license allows higher power and more frequencies. Here's the licensing system and where it overlaps with security research.

Free Spectrum - Frequencies you can use

What Frequencies Are Legal to Use Without a Lic...

8 min read 1678 words 1 week ago

The ISM and UNII bands let you transmit without a license. Here's exactly which frequencies are available and the rules.

What Frequencies Are Legal to Use Without a Lic...

8 min read 1678 words 1 week ago

The ISM and UNII bands let you transmit without a license. Here's exactly which frequencies are available and the rules.

Power Limits - WiFi transmit rules by region

WiFi Transmit Power Limits by Region

7 min read 1508 words 1 week ago

Maximum WiFi transmit power varies by country and band. Here's the global picture and why it matters for portable tools.

WiFi Transmit Power Limits by Region

7 min read 1508 words 1 week ago

Maximum WiFi transmit power varies by country and band. Here's the global picture and why it matters for portable tools.

Part 15 - Rules for unlicensed radio

FCC Part 15: Unlicensed Radio Devices Explained

7 min read 1601 words 1 week ago

Every WiFi router, Bluetooth device, and wireless security tool operates under FCC Part 15. Here are the actual rules.

FCC Part 15: Unlicensed Radio Devices Explained

7 min read 1601 words 1 week ago

Every WiFi router, Bluetooth device, and wireless security tool operates under FCC Part 15. Here are the actual rules.

CE Marking - What it means on electronics

CE Marking Explained for Electronic Devices

7 min read 1635 words 1 week ago

CE marking means a product meets EU directives. Here's what it actually certifies and what it doesn't.

CE Marking Explained for Electronic Devices

7 min read 1635 words 1 week ago

CE marking means a product meets EU directives. Here's what it actually certifies and what it doesn't.

EU RED - Europe's radio equipment rules

What Is the EU RED (Radio Equipment Directive)?

7 min read 1491 words 1 week ago

The EU RED governs all radio equipment sold in Europe. Its 2022 cybersecurity additions directly affect tools like the BLEShark Nano.

What Is the EU RED (Radio Equipment Directive)?

7 min read 1491 words 1 week ago

The EU RED governs all radio equipment sold in Europe. Its 2022 cybersecurity additions directly affect tools like the BLEShark Nano.

FCC - Radio regulations for security tools

What Is the FCC and Why Does It Matter for Secu...

7 min read 1433 words 1 week ago

The FCC regulates every radio device sold in the US. Here's what Part 15 means and why it matters for security tools.

What Is the FCC and Why Does It Matter for Secu...

7 min read 1433 words 1 week ago

The FCC regulates every radio device sold in the US. Here's what Part 15 means and why it matters for security tools.

DNS Hijacking Campaigns

DNS Hijacking Campaigns

8 min read 1770 words 1 week ago

DNS hijacking redirects entire domains to attacker-controlled servers. Here are the major campaigns and how they worked.

DNS Hijacking Campaigns

8 min read 1770 words 1 week ago

DNS hijacking redirects entire domains to attacker-controlled servers. Here are the major campaigns and how they worked.

Supply Chain Attacks on Router Firmware

Supply Chain Attacks on Router Firmware

7 min read 1501 words 1 week ago

VPNFilter infected 500,000 routers. Compromised firmware updates have been found in the wild. Here are the cases.

Supply Chain Attacks on Router Firmware

7 min read 1501 words 1 week ago

VPNFilter infected 500,000 routers. Compromised firmware updates have been found in the wild. Here are the cases.

Credential Harvesting via Captive Portals: Documented Cases

Credential Harvesting via Captive Portals: Docu...

7 min read 1564 words 1 week ago

Fake captive portals that mimic hotel WiFi or airport login pages have captured real credentials. Here are the documented cases.

Credential Harvesting via Captive Portals: Docu...

7 min read 1564 words 1 week ago

Fake captive portals that mimic hotel WiFi or airport login pages have captured real credentials. Here are the documented cases.

Hijacking Smart TVs With IR: The Research

Hijacking Smart TVs With IR: The Research

7 min read 1428 words 1 week ago

Smart TVs accept IR commands with no authentication. Researchers have used this to change settings, inject content, and more.

Hijacking Smart TVs With IR: The Research

7 min read 1428 words 1 week ago

Smart TVs accept IR commands with no authentication. Researchers have used this to change settings, inject content, and more.

Bluetooth Attacks on Vehicles

Bluetooth Attacks on Vehicles

7 min read 1511 words 1 week ago

From infotainment system access to keyless entry relay attacks - how Bluetooth vulnerabilities affect modern vehicles.

Bluetooth Attacks on Vehicles

7 min read 1511 words 1 week ago

From infotainment system access to keyless entry relay attacks - how Bluetooth vulnerabilities affect modern vehicles.

BLE Tracker Stalking: Real Cases and the Response

BLE Tracker Stalking: Real Cases and the Response

7 min read 1440 words 1 week ago

AirTags and Tile trackers have been used for stalking. Here are the cases, the industry response, and what gaps remain.

BLE Tracker Stalking: Real Cases and the Response

7 min read 1440 words 1 week ago

AirTags and Tile trackers have been used for stalking. Here are the cases, the industry response, and what gaps remain.

AirDrop Privacy Leaks and Abuse Cases

AirDrop Privacy Leaks and Abuse Cases

6 min read 1400 words 1 week ago

AirDrop's contact matching leaked partial hashes of phone numbers and emails. Plus the cyber flashing problem.

AirDrop Privacy Leaks and Abuse Cases

6 min read 1400 words 1 week ago

AirDrop's contact matching leaked partial hashes of phone numbers and emails. Plus the cyber flashing problem.

HID Injection Malware in the Wild

HID Injection Malware in the Wild

7 min read 1473 words 1 week ago

HID injection attacks have moved from research talks to real-world incidents. Here are the documented cases.

HID Injection Malware in the Wild

7 min read 1473 words 1 week ago

HID injection attacks have moved from research talks to real-world incidents. Here are the documented cases.

DEF CON Wall of Sheep: Conference WiFi Attacks

DEF CON Wall of Sheep: Conference WiFi Attacks

7 min read 1501 words 1 week ago

The Wall of Sheep displays credentials captured from DEF CON attendees using insecure protocols. Even security pros get caught.

DEF CON Wall of Sheep: Conference WiFi Attacks

7 min read 1501 words 1 week ago

The Wall of Sheep displays credentials captured from DEF CON attendees using insecure protocols. Even security pros get caught.

Evil Twin Attacks at Airports: Documented Cases

Evil Twin Attacks at Airports: Documented Cases

7 min read 1498 words 1 week ago

Real cases of evil twin attacks in airports and transit hubs - what happened, what was captured, and what the research shows.

Evil Twin Attacks at Airports: Documented Cases

7 min read 1498 words 1 week ago

Real cases of evil twin attacks in airports and transit hubs - what happened, what was captured, and what the research shows.

The Target Breach: How an HVAC Vendor Exposed 40M Cards

The Target Breach: How an HVAC Vendor Exposed 4...

6 min read 1304 words 1 week ago

A compromised HVAC vendor's network credentials gave attackers a path to Target's POS systems and 40 million cards.

The Target Breach: How an HVAC Vendor Exposed 4...

6 min read 1304 words 1 week ago

A compromised HVAC vendor's network credentials gave attackers a path to Target's POS systems and 40 million cards.

NotPetya: The Most Destructive Cyberattack in History

NotPetya: The Most Destructive Cyberattack in H...

6 min read 1408 words 1 week ago

NotPetya masqueraded as ransomware but was actually a wiper. It caused $10 billion in damages through a software update.

NotPetya: The Most Destructive Cyberattack in H...

6 min read 1408 words 1 week ago

NotPetya masqueraded as ransomware but was actually a wiper. It caused $10 billion in damages through a software update.

WannaCry: The Ransomware That Used a WiFi-Adjacent Exploit

WannaCry: The Ransomware That Used a WiFi-Adjac...

7 min read 1501 words 1 week ago

WannaCry spread via EternalBlue through SMB, hitting 200,000+ systems in 150 countries in a single weekend.

WannaCry: The Ransomware That Used a WiFi-Adjac...

7 min read 1501 words 1 week ago

WannaCry spread via EternalBlue through SMB, hitting 200,000+ systems in 150 countries in a single weekend.

The Mirai Botnet: How It Changed IoT Security Forever

The Mirai Botnet: How It Changed IoT Security F...

7 min read 1453 words 1 week ago

Mirai scanned for IoT devices with default credentials and built a botnet that took down half the internet.

The Mirai Botnet: How It Changed IoT Security F...

7 min read 1453 words 1 week ago

Mirai scanned for IoT devices with default credentials and built a botnet that took down half the internet.