Exploring The Raspberry Pi 4 USB-C Issue In-Depth

It would be fair to say that the Raspberry Pi team hasn’t been without its share of hardware issues, with the Raspberry Pi 2 being camera shy, the Raspberry Pi PoE HAT suffering from a rather embarrassing USB power issue, and now the all-new Raspberry Pi 4 is the first …read more

Continue reading Exploring The Raspberry Pi 4 USB-C Issue In-Depth

Metropolitan London Police: Face Identity Recognition Tests Proven Fatally Flawed

Problems have arisen for the London Metropolitan Police face recognition program, and more specifically, for the organization’s testing facilities, of same. Via reportage by Matt Burgess, this scenario is particularly troublesome for a law enforcement… Continue reading Metropolitan London Police: Face Identity Recognition Tests Proven Fatally Flawed

Loads of Testing Yields New, Reliable, and Cheap Leather Hardening Technique

Leather hardening has been around for such a long time that one might think that there was little left to discover, but [Jason F. Timmermans] certainly showed that is not the case. Right around the end of 2018 he set up experiments to compare different techniques for hardening leather, and …read more

Continue reading Loads of Testing Yields New, Reliable, and Cheap Leather Hardening Technique

The $50 Ham: Dummy Loads, Part 2

In the last installment of “The $50 Ham” I built a common tool used by amateur radio operators who are doing any kind of tuning or testing of transmitters: a dummy load. That build resulted in “L’il Dummy”, a small dummy load intended for testing typical VHF-UHF handy talkie (HT) …read more

Continue reading The $50 Ham: Dummy Loads, Part 2

The $50 Ham: Dummy Loads

This is an exciting day for me — we finally get to build some ham radio gear! To me, building gear is the big attraction of amateur radio as a hobby. Sure, it’s cool to buy a radio, even a cheap one, and be able to hit a repeater that …read more

Continue reading The $50 Ham: Dummy Loads

A DIY EMC Probe From Semi-Rigid Coax And An SDR

Do you have an EMC probe in your toolkit? Probably not, unless you’re in the business of electromagnetic compatibility testing or getting a product ready for the regulatory compliance process. Usually such probes are used in anechoic chambers and connected to sophisticated gear like spectrum analyzers – expensive stuff. But …read more

Continue reading A DIY EMC Probe From Semi-Rigid Coax And An SDR

Cybersecurity Issues in Mobile App Development

Mobile app development has become a key factor for the success of any business. And as mobile apps have grown more popular among users, it’s important for developers to make security of the apps as important as its features. In mobile apps, security i… Continue reading Cybersecurity Issues in Mobile App Development

Custom Jig Makes Short Work of Product Testing

When you build one-off projects for yourself, if it doesn’t work right the first time, it’s a nuisance. You go back to the bench, rework it, and move on with life. The equation changes considerably when you’re building things to sell to someone. Once you take money for your thing, you have to support it, and anything that goes out the door busted is money out of your pocket.

[Brian Lough] ran into this fact of life recently when the widget he sells on Tindie became popular enough that he landed an order for 100 units. Not willing to cut …read more

Continue reading Custom Jig Makes Short Work of Product Testing

Our “Solution Path for Implementing Threat Detection and Incident Response” Publishes

As you can see below, we have written a lot of research over the years, and it would be handy to have a roadmap for the readers. This is especially useful for organizations that are in the phase of “OMG WHAT TO DO WITH ALL THIS CYBER?” phas… Continue reading Our “Solution Path for Implementing Threat Detection and Incident Response” Publishes

Incident Response: 5 Tips to Ensure Your Plan is Ready

There is a common refrain among security industry veterans that it is not a matter of if, but when, a breach or other security incident occurs. Protection and prevention are only one slice of the pie when it comes to a holistic security program. Incid… Continue reading Incident Response: 5 Tips to Ensure Your Plan is Ready