The Other Kind Of Static Hazard to Your Logic Circuits

We’ve all heard of the dangers of static electricity when dealing with electronics, and we all take the proper precautions when working with static-sensitive components — don’t we? But as …read more Continue reading The Other Kind Of Static Hazard to Your Logic Circuits

Vacuum Tube Logic Hack Chat

Join us on Wednesday, December 9th at noon Pacific for the Vacuum Tube Logic Hack Chat with David Lovett!

For most of us, circuits based on vacuum tubes are remnants of a technological history that is rapidly fading from our collective memory. To be sure, there are still applications for …read more

Continue reading Vacuum Tube Logic Hack Chat

Reverse Engineering a Module from a Vacuum Tube Computer

It’s best to admit upfront that vacuum tubes can be baffling to some of the younger generation of engineers. Yes, we get how electron flow from cathode to anode can be controlled with a grid, and how that can be used to amplify and control current. But there are still …read more

Continue reading Reverse Engineering a Module from a Vacuum Tube Computer

Detecting Cars with an ESP8266 Magnetometer

Having a motorized gate on your driveway is great, but only if there’s an easy way to trigger it. [Andrew] says the gate at his parent’s place could only be controlled by manually pushing a button on the panel or with a dinky remote that didn’t have nearly the range …read more

Continue reading Detecting Cars with an ESP8266 Magnetometer

Internet of Things Opens Possibilities

While a lot of hardware gets put on the “Internet of Things” with only marginal or questionable benefits (or with hilariously poor security), every now and then a project makes use of this new platform in a way that illustrates the strengths of IoT. [ThingEngineer] turned to this platform as a cost-effective solution for an automatic gate, since new keyfobs were too expensive and a keypad was not an option.

Using an Electric IMP, [ThingEngineer] began by installing his IoT patch into the LiftMaster gate control box. This particular gate has easily accessible points that the controller can access to …read more

Continue reading Internet of Things Opens Possibilities

Cerber ransomware delivered in format of a different order of Magnitude

We review a trick that the Magnitude exploit kit uses to bypass security scanners.
Categories:
Exploits
Threat analysis
Tags: binary paddingcerberexploit kitgateMagnigatemagnitude EKransomwareXML

(Read more…)

The post Cerber ransomware delivered… Continue reading Cerber ransomware delivered in format of a different order of Magnitude