Guide Archives - Thyrasec https://www.thyrasec.com/blog/category/guide/ Mon, 12 Feb 2024 03:31:47 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.3 https://www.thyrasec.com/wp-content/uploads/2023/12/cropped-thyrasec-logo-01-32x32.png Guide Archives - Thyrasec https://www.thyrasec.com/blog/category/guide/ 32 32 Using OpenSSL for Securing Bluetooth and Wireless Devices https://www.thyrasec.com/blog/using-openssl-for-securing-bluetooth-and-wireless-devices/?utm_source=rss&utm_medium=rss&utm_campaign=using-openssl-for-securing-bluetooth-and-wireless-devices Sun, 28 Jan 2024 03:44:00 +0000 https://www.thyrasec.com/?p=434 In the rapidly evolving world of embedded systems, security has become a paramount concern. With the ...

Read More from Using OpenSSL for Securing Bluetooth and Wireless Devices

The post Using OpenSSL for Securing Bluetooth and Wireless Devices appeared first on Thyrasec.

]]>
Building BlueZ – For Defense and Offense https://www.thyrasec.com/blog/building-bluez-for-defense-and-offense/?utm_source=rss&utm_medium=rss&utm_campaign=building-bluez-for-defense-and-offense Fri, 19 Jan 2024 06:36:06 +0000 https://www.thyrasec.com/?p=418 What’s BlueZ BlueZ is an open-source Bluetooth stack implementation for Linux-based operating systems. The stack implementation ...

Read More from Building BlueZ – For Defense and Offense

The post Building BlueZ – For Defense and Offense appeared first on Thyrasec.

]]>
Extracting Firmware from EEPROM, Flash and eMMC https://www.thyrasec.com/blog/extracting-firmware-from-eeprom-flash-and-emmc/?utm_source=rss&utm_medium=rss&utm_campaign=extracting-firmware-from-eeprom-flash-and-emmc Tue, 12 Dec 2023 22:11:24 +0000 https://www.thyrasec.com/?p=257 We’ve previously covered some of the best tools for reversing firmware that you should be using, ...

Read More from Extracting Firmware from EEPROM, Flash and eMMC

The post Extracting Firmware from EEPROM, Flash and eMMC appeared first on Thyrasec.

]]>
Firmware Reversing and Analysis Tools https://www.thyrasec.com/blog/firmware-reversing-and-analysis-tools/?utm_source=rss&utm_medium=rss&utm_campaign=firmware-reversing-and-analysis-tools Tue, 12 Dec 2023 08:31:10 +0000 https://www.thyrasec.com/?p=198 Firmware sits at the core of almost every electronic product today. It’s at the heart of ...

Read More from Firmware Reversing and Analysis Tools

The post Firmware Reversing and Analysis Tools appeared first on Thyrasec.

]]>
Bluetooth Security Primer – Classic + BLE https://www.thyrasec.com/blog/bluetooth-security-primer-classic-ble/?utm_source=rss&utm_medium=rss&utm_campaign=bluetooth-security-primer-classic-ble Thu, 07 Dec 2023 07:19:00 +0000 http://dev.thyrasec.com/?p=26 Background Bluetooth is one of the most popular wireless protocols for devices. Maybe the biggest reason ...

Read More from Bluetooth Security Primer – Classic + BLE

The post Bluetooth Security Primer – Classic + BLE appeared first on Thyrasec.

]]>
Top 10 Wireless Security Issues https://www.thyrasec.com/blog/top-10-wireless-security-issues/?utm_source=rss&utm_medium=rss&utm_campaign=top-10-wireless-security-issues Tue, 05 Dec 2023 07:31:56 +0000 https://thyrasec.com/?p=128 Wireless systems spread the gamut from narrowband single channel transmitters to multi-gigabit Wi-Fi using OFDMA and ...

Read More from Top 10 Wireless Security Issues

The post Top 10 Wireless Security Issues appeared first on Thyrasec.

]]>
Wireless Security Challenges https://www.thyrasec.com/blog/wireless-security-challenges/?utm_source=rss&utm_medium=rss&utm_campaign=wireless-security-challenges Sun, 03 Dec 2023 10:04:10 +0000 http://dev.thyrasec.com/?p=29 Wireless devices are all around us. We rely on them for everything we do, from opening ...

Read More from Wireless Security Challenges

The post Wireless Security Challenges appeared first on Thyrasec.

]]>
Open vs Closed Source Stack Security https://www.thyrasec.com/blog/open-vs-closed-source-stack-security/?utm_source=rss&utm_medium=rss&utm_campaign=open-vs-closed-source-stack-security Sat, 02 Dec 2023 23:41:21 +0000 http://dev.thyrasec.com/?p=77 Over the last year, there’s been a few vulnerabilities founds for the Zephyr Bluetooth stack: CVE-2023-5753 ...

Read More from Open vs Closed Source Stack Security

The post Open vs Closed Source Stack Security appeared first on Thyrasec.

]]>