Browsed by
Category: Uncategorized

Computers and Security – Peer Reviewed Publication

Computers and Security – Peer Reviewed Publication

Happy to announce that my first paper is available via open access in Springer’s Computers and Security journal. CoSe is one of the top three cybersecurity journals worldwide, so this being the venue for my first paper is amazing. We are also starting to see citations as well, which shows the impact of our work and where it is published. The paper can be read for free via https://www.sciencedirect.com/science/article/pii/S0167404823005977

Smart Security Device RFID Vulnerability Disclosure

Smart Security Device RFID Vulnerability Disclosure

The details below discuss the vulnerabilities found in the following devices: The use of low-frequency (LF) RFID tags is a significant security issue. These tags do not support any form of encryption and so can be read using an NFC-equipped mobile phone or dedicated reader in under a second. The only information encoded is a number, and so using software to write to blank tags it is possible to create any number of duplicate tags possessing the same permissions as…

Read More Read More

Wireless Alarm System Vulnerabilities

Wireless Alarm System Vulnerabilities

Recently I had a chance to look at a number of intruder alarm systems sold via Amazon and eBay. These devices sell for up to £150, and a number are best sellers As discussed in my last post, RF frequency communication can be captured relatively easily, using a software-defined radio (SDR). All four devices use 433MHz RF to communicate between the sensors and the base station. Capturing transmissions from each device proved extremely simple; the following shows the result of…

Read More Read More

Hacking 433MHz Radio – An Overview

Hacking 433MHz Radio – An Overview

Have you ever wondered how wireless devices like remote controls or wireless sensors work? Chances are they use 433MHz radio technology. However, as with any technology, 433MHz radio signals can be vulnerable to hacking and exploitation. In this blog post, we’ll take a closer look at how 433MHz radio signals work, the tools and techniques used for hacking them, and the potential risks and benefits of such activities. To understand how to hack 433MHz radio, it’s important to first understand…

Read More Read More

Am I an academic now?

Am I an academic now?

So, for the past two years I have been studying for a Masters in Cybersecurity part time, and thankfully managed to pass with a Distinction. Yay! It’s an itch that I’ve been wanting to scratch for a good long while, and I’m glad to have done it. This leads me on to my next announcement. I’m going to be studying for a PhD in IoT Security part time, alongside my current work commitments. A couple of people have asked me…

Read More Read More