Microsoft’s Involvement with Raspberry Pi OS: What You Need to Know

Microsoft's Involvement with Raspberry Pi OS: What You Need to Know

Introduction: More: • 3.2 billion emails and plaintext passwords leaked • Chrome 88 widely launched the feature to share web pages via QR codes Word count: 1119, reading time approximately: 1 minute Author: Hardcore Lao Wang Are you running Raspberry Pi OS? Microsoft knows you are. The official operating system supported by the Raspberry Pi … Read more

Secure ARM Cortex-M4F Microprocessor MAX32520 Live Stream Event

Secure ARM Cortex-M4F Microprocessor MAX32520 Live Stream Event

_ Live Stream Time July 30 10:00-12:00 Live Stream Content Introduction to secure encryption Basic features and functionalities of MCU MAX32520, etc. 【Instructor Introduction】 Li Minglin Senior Application Engineer at Maxim Integrated Li Minglin joined Maxim in 2019, working in the Shenzhen office, responsible for technical support of secure MCUs in the Asia-Pacific region. Before … Read more

The Ultimate Guide to IoT Gateway Operations

The Ultimate Guide to IoT Gateway Operations

The IoT gateway improves response time and minimizes network transmission costs. It serves as a link between IoT devices and the cloud. IoT technology is maturing and providing exciting solutions across various fields. IoT offers practical solutions that can be implemented in different industries. In this article, we will discuss an important component of the … Read more

Practical BadUSB Attack Based on Arduino Leonardo

Practical BadUSB Attack Based on Arduino Leonardo

* Original Author: Professor X, this article is part of the FreeBuf original reward plan, reprinting without permission is prohibited. Introduction Many students on Freebuf have shared their views on HID attacks, such as Viks’ ‘Quickly Making Teensy BadUSB with Arduino’, which provides a detailed description of the BadUSB production process both from a popular … Read more

Exploring Hardware Security on a Budget: BadUSB with Arduino

Exploring Hardware Security on a Budget: BadUSB with Arduino

*This article is originally written by: ya0guang. It is part of the FreeBuf original reward program, and reproduction without permission is prohibited. Introduction Given that hardware security is a subject that most newcomers have little exposure to, and it is very appealing, the high prices of some professional security research equipment can be daunting. In … Read more

Enhancing Functional Safety and Cybersecurity Solutions for Arm Automotive Products

Enhancing Functional Safety and Cybersecurity Solutions for Arm Automotive Products

Disclaimer: The content and images of this article are reprinted from BC-AUTO. 2019 Intelligent Automotive Operating System Industry Research Report 2019 Software-Defined Automotive Industry Research Report 2019 China Intelligent Automotive Industry Mainstream Tier 1 Research Report 2019 Global Intelligent Automotive Cybersecurity and Information Security Industry Research Report 2019 China Onboard Gateway Industry Research Report 2019 … Read more

A Comprehensive Guide to Android Root Detection and Bypass

A Comprehensive Guide to Android Root Detection and Bypass

0x01 Introduction Android is based on the Linux multi-user access control mechanism. By default, applications cannot execute other applications, including reading and writing users’ private data. The process of an application is a secure sandbox (running the application in a restricted security environment, with all changes in the sandbox having no harm to the operating … Read more

IOT Competition Review and MQTT RCE Analysis 2024

IOT Competition Review and MQTT RCE Analysis 2024

One Introduction This year’s West Lake Sword IOT part provided a development board equipped with OpenWrt, and participants needed to analyze the development board and the provided Firmware.zip to answer the questions posed by the organizers. Two Overview of Questions and Score Distribution Since there were no screenshots of the questions retained, I organized the … Read more

Creating a Fire and Theft Prevention System with Raspberry Pi

Creating a Fire and Theft Prevention System with Raspberry Pi

The graduation season is approaching, and this time I joined the army of graduates and rented a house outside. But for some reason, I worry every day at work whether my home will be burglarized? Is there any plug that hasn’t been pulled that might cause a fire? I heard this is a condition, but … Read more

Transform Your Raspberry Pi into a Penetration Testing Tool

Transform Your Raspberry Pi into a Penetration Testing Tool

*This article is written by: Meow God 2017, and it belongs to the FreeBuf original reward program. Reproduction without permission is prohibited. Preparation and Introduction Once, a friend of mine said he wanted to buy the hak5 Bash Bunny, a network hijacking keyboard injection all-in-one BadUSB. It looked great, but unfortunately, my friend said he … Read more