BSidesRI video: modding the TP-Link WR703N router

At the recent BSidesRI conference in Rhode Island, USA, James Edge presented an overview of the TP-Link WR703N wireless router, and how it is modifiable akin to the WRT54G. (The manufacturer’s website does not contain documentation for the 703N. The linked doc is for the 702N, which has many of the same features and functions […]

29C3 – Further hacks on the Calypso platform

In this presentation from the just concluded 29C3 conference in Hamburg, Germany, speaker Sylvain Munaut explains how to turn a cellphone into a BTS. The Calypso baseband and its companion chips are used on the Motorola C123 among other and are now well known for being supported by the Osmocom-BB open source GSM baseband implementation. […]

DEFCON 20: Hacking [Redacted] Routers

At last summer’s DEFCON 20 conference, speakers FX and Greg gave this presentation on exploring Huawei routers. These devices are growing in market share in many countries, even used by tier one ISPs. They explore the device’s software platform and security, highlighting the architecture, configurations and services available as well as summarizing their efforts in […]

DCC 2012: FlexRadio and SDR architecture

At the 31th Annual ARRL and TAPR Digital Communications Conference held last September in Atlanta, GA, FlexRadio VP Stephen Hicks N5AC gives an in depth presentation on SDR and its potential. He outlines his company’s new Flex 6000 series, a Linux based commercial product based on components used in government radios. While this is not […]

SkyDogCon 2012 : Cryptanalysis of the enigma

At the recent SkyDogCon conference, Bob Weiss and Benjamin Gatti presented this talk analyzing Enigma, the World War II era Nazi encryption machine. The encryption theory behind Enigma is covered, including a detailed under-the-hood view of a typical device. Finally, a demo is conducted using a laptop in an effort to crack an Enigma message. […]

Webcast today: Arduino controlled robots

O’Reilly is offering a free webcast on Making Arduino Controlled Robots. The one hour presentation is scheduled for Tuesday, October 30, 2012 (yes, that’s today — short notice) at 10 AM PT and features Michael Margolis, author of the Making an Arduino-Controlled Robot. The presentation focuses on sensors and motor controllers in Arduino projects with […]

DeepSec 2011: intelligent Bluetooth fuzzing – why bother?

Security researchers Tommi Mäkilä and Jukka Taimisto of Codenomicon gave this presentation at the DeepSec 2011 conference discussing ways to sensibly test Bluetooth stacks. Their talk presents the number of ways in which Bluetooth attacks have been attempted with varying degrees of success. They also present a discussion on fuzzing techniques and creating intelligent fuzzers […]

DeepSec 2011: patching vehicle insecurities

In this talk from the DeepSec 2011 conference Constantinos Patsakis and Kleanthis Dellios discuss their theory for developing more effective automotive security anti-theft systems. They explain: “In order to patch known security breaches and create a more extensible in-vehicle computer system, we propose the use of a TTP (Time-Triggered Protocol) entity inside the vehicle, which […]

DEFCON 20: Hacking smart meters

At the recent DEFCON 20 conference in Las Vegas, Don C. Weber presented this talk on smart meter technology and security. The presentation deals with the optical port found on smart meters, and covers attacks from quick memory acquisition techniques to more complex hardware bus sniffing, as well as how authentication credentials are acquired. Finally, […]

Notacon 9: Pwn the Drones

In this video from the recent Notacon 9 conference, EFF activists Trevor Timm and Parker Higgins present on the widespread and increasing use of drones by government. Aspects of recent drone hacks are highlighted, security flaws noted, as well as the growing popularity of DIY civilian drones. For more information on the use of drones […]

Free webinar: FPGA programming in C code

Newark/element14 and David Pellerin, co-founder of Impulse Accelerated Technologies, have teamed up to offer a free webinar on programming in C code on an FPGA using the Altera Cyclone development platform. They promise, “In 45 minutes you will learn how you can leverage distributed processing for a C code algorithm across your entire embedded system […]

HOPE 9 conference live audio/video stream

The Hackers On Plant Earth conference, known as HOPE Number 9, is currently underway in New York City. The conference runs through July 15 and features speakers on a wide array of topics of interest to the hacker and open source community. The conference is sponsored by 2600 Magazine and occurs biennially in even numbered […]

Free webcast: Expanding the Capabilities of your Arduino Projects

O’Reilly is offering a free webcast on Expanding the Capabilities of your Arduino Projects. The one hour presentation is scheduled for Tuesday, June 19, 2012 at 10 AM PT and features Michael Margolis, author of the Arduino Cookbook, 2nd Edition. For more information or to register visit O’Reilly’s webcast registration page. Via MAKE.

28C3 – Introducing Osmo-GMR: Building a Sniffer for the GMR Satphones

In this video from the 28C3 Conference in Berlin, Sylvain Munaut describes the latest member of the Osmocom-family projects, osmo-gmr. This project focuses on the GMR-1 (GEO Mobile Radio) air interface used in some satellite Phones. Sylvain discusses the GMR protocol, the Thuraya network that uses this protocol in the Eurasian/African and Australian continents and […]

DCC 2011 – PhoneSat: sub $10k spacecraft

Mike Safyan is an amateur radio operator KJ6MVL who works at NASA. In this talk from the 2011 ARRL/TAPR DCC in Baltimore, Mike describes the PhoneSat project, whose goal is to produce a functioning satellite module for under $10,000. Picture a Nexus Android phone, Arduino and RF transmitter inside a 10cc standard flight-safe housing cube […]

O’Reilly webcast: Hacking and Securing iOS Applications

O’Reilly is presenting a free webcast by Jonathan Zdziarski on the topic of Hacking and Securing iOS Applications on May 3, 2012, at 1 PM PT. Jonathan is the author of the O’Reilly book by the same title. In this webcast, Jonathan will demonstrate a number of ways to manipulate the runtime of App Store […]

O’Reilly video: Intro to Gestural Interfaces with the Microsoft Kinect

This webcast by Greg Borenstein presented by O’Reilly offers a solid introduction to building your own applications with the Microsoft Kinect. Beginners will find a wealth of information about the Kinect’s theory of operation and how to use the data it generates to work with Arduino, Processing and other frameworks. The importance of the calibration […]

Shmoocon 2012: GHz or Bust!

Chronos hackers take note! In this presentation from the Shmoocon 2012 conference, atlas 0f d00m talks about using the USB RF dongle that comes with the EZ430 Chronos watch to conduct experiments in the ISM bands. This talk covers a lot of ground giving practical information on the ISM bands, modulation techniques, and the inner […]