Obtaining the secret TETRA primitives after decades in the…
prevent your robot from sucking your data
the superior Multi Factor Authentication Framework
Attacking an opensource U2F device in 30 minutes or less
Building disposable Windows VMs
now is the time to take action!
A hacker's view at commercial drone security
Bypassing Enterprise Policy in Firefox
And the malware and backdoors that came with it.
Insights into the hardware and software of sounding rockets
Unleashing Reinforcement Learning in Penetration Testing…
Building Modern Cryptography