At&Df: Side-Channel Data Encoding Through Virtual MouseMvm(CursorHoppingEncoder)
zenodo.org·15h·
Discuss: Hacker News
🦠Malware Analysis
The Making of a Minimalist Analog Drum Machine
hackaday.com·16h
🧪Cassette Hacks
Adaptive Diffusive Quantization for Enhanced Image Reconstruction Fidelity
dev.to·11h·
Discuss: DEV
🖼️JPEG XL
When we can verify a person but recognize nothing–what are we authenticating?
syntheticauth.ai·8h·
Discuss: Hacker News
🔗Data Provenance
Behold, my stuff
i.redd.it·1h·
Discuss: r/homelab
🏠Homelab Preservation
Spot trouble early with honeypots and Suricata
pentestpartners.com·12h
🛡️eBPF Security
Revisiting bsdiff as a tool for digital preservation
exponentialdecay.co.uk·4d
💿FLAC Archaeology
Bluetooth Low Energy (BLE) Audio: A guide for OEMs
hackster.io·7h
📡Bluetooth Archaeology
Hunting SharpHounds with Spectra Analyze
reversinglabs.com·6h
🦠Malware Analysis
Foreground vs. Background: Analyzing Typographic Attack Placement in Autonomous Driving Systems
hackernoon.com·1d
🔍Character Forensics
Quantum key distribution method tested in urban infrastructure offers secure communications
phys.org·4h
🔐Quantum Security
Release of ERNW White Paper 73: Analyzing WinpMem Driver Vulnerabilities
insinuator.net·9h
🧠Memory Forensics
I/Q Data for Dummies
whiteboard.ping.se·17h·
Discuss: Hacker News
📊Frequency Analysis
A $50 'Battering RAM' Can Bust Confidential Computing
darkreading.com·1d
🔓Hacking
Insecure Mobile VPNs: The Hidden Danger
zimperium.com·8h
🌐DNS Security
Signal Protocol and Post-Quantum Ratchets
signal.org·21h·
🔐Quantum Security
TOTOLINK X6000R: Three New Vulnerabilities Uncovered
unit42.paloaltonetworks.com·1d
🛡️eBPF Security
Your Smart Home is Betraying You: How to Secure IoT Devices (Cameras, Speakers, Kettles)
forums.anandtech.com·1d
🏠Home Automation
This is serious, I am not kidding
aardvark.co.nz·1d
Proof Automation
What Did the Attacker Read? MailItemAccessed Tells You
blog.nviso.eu·14h
🔍NTLM Forensics