Decoding the Netflix Announcement: Explaining Optimized Shot-Based Encoding for 4K

Netflix has recently announced that they now stream optimized shot-based encoding content for 4K. When I read that news title I though to myself: “Well, that’s great! Sounds good but… what exactly does that mean? And what’s shot-based encoding anyway?”

These questions were basically how I ended up in the …read more

Continue reading Decoding the Netflix Announcement: Explaining Optimized Shot-Based Encoding for 4K

Separation Between WiFi and Bluetooth Broken by the Spectra Co-Existence Attack

This year, at DEF CON 28 DEF CON Safe Mode, security researchers [Jiska Classen] and [Francesco Gringoli] gave a talk about inter-chip privilege escalation using wireless coexistence mechanisms. The title is catchy, sure, but what exactly is this about?

To understand this security flaw, or group of security flaws, we …read more

Continue reading Separation Between WiFi and Bluetooth Broken by the Spectra Co-Existence Attack

NFC False Tag Vulnerability – CVE-2019-9295

Introduction Security Aspects of Android Android is a privilege-separated operating system, in which each application runs with a distinct system identity (Linux user ID and group ID). Parts of the system are also separated into distinct identities. Li… Continue reading NFC False Tag Vulnerability – CVE-2019-9295

A Hydrogen Fuel Cell Drone

When we think about hydrogen and flying machines, it’s quite common to imagine Zeppelins, weather balloons and similar uses of hydrogen in lighter-than-air craft to lift stuff of the ground. But with smaller and more efficient fuel cells, hydrogen is gaining its place in the drone field. Project RACHEL is …read more

Continue reading A Hydrogen Fuel Cell Drone

Faxsploit – Exploiting A Fax With A Picture

Security researchers have found a way to remotely execute code on a fax machine by sending a specially crafted document to it. So… who cares about fax? Well apparently a lot of persons are still using it in many institutions, governments and industries, including the healthcare industry, legal, banking and …read more

Continue reading Faxsploit – Exploiting A Fax With A Picture

How-To: Mapping Server Hits with ESP8266 and WS2812

It has never been easier to build displays for custom data visualization than it is right now. I just finished one for my office — as a security researcher I wanted a physical map that will show me from where on the planet my server is being attacked. But the …read more

Continue reading How-To: Mapping Server Hits with ESP8266 and WS2812

Stealing DNA By Phone

Data exfiltration via side channel attacks can be a fascinating topic. It is easy to forget that there are so many different ways that electronic devices affect the physical world other than their intended purpose. And creative security researchers like to play around with these side-effects for ‘fun and profit’. …read more

Continue reading Stealing DNA By Phone

3D Printing a Real Heart

As 3D printing becomes more and more used in a wide range of fields, medical science is not left behind. From the more standard uses such as printing medical equipment and prosthetics to more advanced uses like printing cartilages and bones, the success of 3D printing technologies in the medical …read more

Continue reading 3D Printing a Real Heart

1 Trillion USD Refund! (PDF Enclosed)

Security researchers have found that it is possible to alter a digitally signed PDF without invalidating its signatures. To demonstrate it, they produced a fake document “refund order” of $1,000,000,000,000 dollars, with a valid signature from Amazon. This sparked my attention, since I was quite sure that they didn’t used …read more

Continue reading 1 Trillion USD Refund! (PDF Enclosed)