top of page
Search
Martian
Feb 25, 20245 min read
Practicing Digital Hygiene: MFA for the win!
According to Verizon's research, a startling 80% of data breaches include the use of lost or stolen credentials, highlighting the...
Martian
Feb 1, 20246 min read
Practicing Digital Hygiene: Data Broker Protection
Social media accounts are the first things that spring to mind when discussing internet privacy and information sharing. Social media...
Martian
Feb 1, 20249 min read
Practicing Digital Hygiene: Safe Browsing
Cyber hygiene is something that describes the measures an individual takes to protect oneself against cybercrime. The positive aspects of...
Martian
Feb 1, 20245 min read
Practicing Digital Hygiene: Using Password Managers
The Benefits and the Reasons for Using Password Managers According to the 2023 Specops Weak Password Report, which analyzed over 800...
Martian
Oct 7, 202320 min read
Code Review: Detecting and Preventing XSS Vulnerabilities
Introduction What is XSS? Cross-Site Scripting (XSS) is a specific kind of vulnerability that can be found in web applications. It...
trustyape
Oct 7, 202311 min read
Reverse Engineering with GDB
Gnu Debugger for beginners What is GDB and why do we need it? GDB also known as a GNU Debugger is a free software written by Richard...
totallynotahaxxer
Sep 16, 202375 min read
Automotive Security: Reversing CAN
Reversing CAN — Introduction & Layout Ah yes, another cool article in on my automotive series! In this article, as you can imagine, we...
totallynotahaxxer
Sep 16, 202367 min read
Automotive Security: FlexRay
Automotive Security — Going Over FlexRay | Introduction As the automotive world continues to grow with the technological world, protocols...
totallynotahaxxer
Sep 16, 202342 min read
Automotive Security: Modeling &Â Rating
Automotive Security | Modeling — Introduction Hey there my fellow nerd! Welcome to the second article in the automotive security series I...
totallynotahaxxer
Sep 16, 202374 min read
Automotive Security: The CAN Bus
Automotive Security: CAN | Introduction && Layout As you have imagined, in my automotive security series, we were eventually going to...
bottom of page