Benjamen LiminCSG @ GovTechReverse Engineering a SmartwatchSharing the reverse engienering process of a smartwatch from reprogramming to firmware patching!Jun 271
RiddhishExploiting Insecure MQTT Protocol: A Step-by-Step Guide for Ethical HackersThis guide explores the MQTT vulnerabilities, showing how attackers can exploit insecure configurations. With step-by-step example18h ago18h ago
Kem-Laurin Lubin, Ph.D-CLiving in an IoT world: the hidden tech shaping our lives5 reasons why we shouldn’t let itApr 216Apr 216
Benjamen LiminCSG @ GovTechReverse Engineering a SmartwatchSharing the reverse engienering process of a smartwatch from reprogramming to firmware patching!Jun 271
RiddhishExploiting Insecure MQTT Protocol: A Step-by-Step Guide for Ethical HackersThis guide explores the MQTT vulnerabilities, showing how attackers can exploit insecure configurations. With step-by-step example18h ago
Kem-Laurin Lubin, Ph.D-CLiving in an IoT world: the hidden tech shaping our lives5 reasons why we shouldn’t let itApr 216
AkashpoovaragavanConnect BLE Devices with React Native BLE PLXIn today’s interconnected world, Bluetooth Low Energy (BLE) devices play a significant role in various applications, from healthcare to…Feb 291
Tamarah UsherinSlalom BusinessYour Future Customer is a MachineNavigating the shift from human to machine-driven consumerismFeb 285