Filip ZvařičSept. 22, 2020
[-]

Car Hacking Introduction

How to control a car remotely? Or, how to unlock a car without brute force? In this article, we will answer not only the questions above, but many others too. We will take a look at the systems in modern vehicles, attack vectors on vehicles and describe the principles of the most common types of attacks.

Michael KupkaApril 20, 2020
[-]

Akuvox – Intercom and Doorbell (IoT Case Study)

We come with the next part in the series on the security of commonly available IoT devices. This time we will take a look, beside other things, at a smart doorbell – can an attacker watch you through its camera? Will the bell open the front door even without PIN? We tested the device literally "through and through". Come and take a look.

Lukáš AntalStanislav KlubalAug. 16, 2019
[-]

ATM Security

Security of automated teller machines (ATMs) is not a very widely discussed topic. So, does it mean then, that ATMs are safe? Our expert team conducted penetration testing on various types of ATMs and is therefore able to objectively assess the issue. The conclusions may surprise you.

Martin MusilAug. 7, 2019
[-]

Google Smart Lock - Trusted Face

At present, new frameless mobile phones offer biometric authentication with face recognition and it became very popular among users. But is this method secure and applicable in all circumstances? In our hacking lab, we took a good look at Google solution allowing usage of this modern authentication method even on cheap mobile devices.