Asymmetry #1.1: PerceptionYou know when people tell you “it’s all in your head”? They’re usually right.Jun 10, 2021Jun 10, 2021
Using Tor To Secure IoT DeploymentsThis project was an inspired replica (almost) from a project in a research paper written by Dr. Gregory Epiphaniou from the University of…May 30, 2021May 30, 2021
ICS Security — The Blockchain WaySaudia Arabia 2017, Ukraine 2015, Iran 2007 and United States of America 2021.Feb 26, 2021Feb 26, 2021
Securing Cyber-Physical Systems IThis is the first-most article in the Securing Cyber-Physical Systems Series, where I introduce the series and talk about Hardware…Jan 18, 2021Jan 18, 2021
IoT Security: Firmware ExploitationIn this article we take a look at firmware exploitation. I exploit a wireless camera and talk about simple and advanced safety practices.Oct 30, 2020Oct 30, 2020
Published inThe IOT MagazineIntroduction To IoT Structure & Security: The Achilles HeelExploring Gateways and IoT Vulnerabilities on a basic levelOct 10, 2020Oct 10, 2020
A Look Into The Large World Of NanosensorsThe objective of these sensors is to screen and measure any chemical, mechanical, and physical changes that are related to the analyte…Mar 24, 2020Mar 24, 2020