Chirag Jariwala

February 15, 2021
OWASP IOT

OWASP IoT Top 10 Series: Weak or Hardcoded Password Policy OWASP

In the last blog we had explored OWASP IoT Top 10 vulnerabilities overview, now we will explore the impact of each of these OWASP vulnerabilities on […]
January 19, 2021
OWASP Top 10 Vulnerabilities

OWASP Top 10 Vulnerabilities IoT Security: Lack of Physical Hardening

With ever increases attack surfaces with IoT devices, physical hardening is also one of the important aspects of IoT Security. Many times these devices are being […]
January 1, 2021
Phishing_Attacks_COVID_19

How to Secure Yourself From Coronavirus Phishing Attacks in Times of COVID-19

Introduction The year 2021 just had just started and we got struck with global pandemic COVID-19 caused by the novel coronavirus. With this global fear, one […]
July 18, 2020

OWASP Top 10 Overview and Vulnerabilities

What is OWASP? OWASP, also known as the Open Web Application Security Project, is an online platform that creates articles available freely, programs, documentation, tools, and […]
September 4, 2019

CAN Bus protocol Penetration testing and forensics

Introduction CAN (Controller Area Network) is a vehicle bus protocol standard which allows microcontrollers and ECU (electronic control units) to communicate which each other without a […]
August 12, 2019
EEPROM without desoldering

Reading data from EEPROM without desoldering

Introduction In IoT/Hardware security it is a common practice of dumping firmware/bootloader data in order to perform reverse engineering for closed source system applications. Well, the […]
Enable Notifications    OK No thanks