Tarlogic's Blog - Cybersecurity - Page 7

Cybersecurity articles with security analysis and ethical hacking technics information

Hardware hacking: chip-off for beginners
Hardware hacking: chip-off for beginners

Introduction to hardware hacking Before getting our hands dirty with hardware hacking, let’s start with a brief introduction to flash memories, a component that we will find very[...]

Read more
Introduction to Dynamic Cybersecurity Risk
Introduction to Dynamic Cybersecurity Risk

Defining the correct risks levels to cyber assaults that any company is exposed is a priority of this time. We present the first of three articles that, together, represent the int[...]

Read more
Security in PRIME networks – Current status
Security in PRIME networks – Current status

Since January 2019, all electricity meters for low power customers (up to 15 kW) in Spain are (or have been replaced by) smart electricity meters, allowing distributors to carry ou[...]

Read more
LoRaWAN 1.0, vulnerabilities and backward compatibility in version 1.1
LoRaWAN 1.0, vulnerabilities and backward compatibility in version 1.1

To understand the security improvements introduced in 1.1, it is necessary to have a thorough understanding of the security mechanisms described in LoRaWAN 1.0. LoRaWAN Security As[...]

Read more
Cybersecurity in LoRa and LoRaWAN: Context and Background
Cybersecurity in LoRa and LoRaWAN: Context and Background

Since the beginning of the 21st century, the concept of Internet of Things (IoT) has gradually evolved from the initial vague ideas related to the interconnection of everyday objec[...]

Read more
Smart Meters – Assessing Concentrator Risk
Smart Meters – Assessing Concentrator Risk

A key element in any remote management infrastructure is the concentrator.  This device, located between the PLC network to which the smart meters are connected and the IP network[...]

Read more
Smart Meters – A proof of concept: hacking a smart meter
Smart Meters – A proof of concept: hacking a smart meter

In previous articles, sufficient evidence has been provided (both from theory and passive observation PLC traffic) to prove that the PRIME protocol is vulnerable to cyberattacks du[...]

Read more
Kerberos (III): How does delegation work?
Kerberos (III): How does delegation work?

Introduction to Kerberos delegation There are several kinds of delegation implemented by using the Kerberos protocol on Windows and Linux servers. Basically, delegation allows a se[...]

Read more
Smart Meters – Threats and Attacks to PRIME Meters
Smart Meters – Threats and Attacks to PRIME Meters

A golden rule in the world of cybersecurity is that the system risk is greater than the aggregate risk of its component elements. This is because, as the number of vulnerable eleme[...]

Read more
Smart Meters – The Spanish Scenario and the Telemanagement System
Smart Meters – The Spanish Scenario and the Telemanagement System

Smart meters have become a reality in recent years not only in new housing, but also in older buildings where—by legal requirement—they have had to renew their measuring device[...]

Read more
1 4 5 6 7 8 9 10 11