Skip to content
  • Home
  • About Us
  • Services
  • Products
  • Blog
    • Firmware Analysis
    • Hardware Security
    • IoT Security
    • Embedded Security
  • Contacts
SecureVity Blog Trust.Protect.Secure
SecureVity Blog Trust.Protect.Secure
  • Home
  • About Us
  • Services
  • Products
  • Blog
    • Firmware Analysis
    • Hardware Security
    • IoT Security
    • Embedded Security
  • Contacts
Hardware Security

HackRF

The HackRF is a Software Defined Radio (SDR) device capable of transmitting and receiving signals across a wide...
SecureVity ResearcherJan 10, 2025Jan 10, 2025
Hardware Security

Hardware Hacking Tools

Hak5 offers a variety of hardware hacking tools designed for penetration testing, security research, and exploration of various...
SecureVity ResearcherJan 10, 2025
Hardware Security

Flipper Zero

The Flipper Zero is a versatile, open-source, multi-functional device designed for interaction with various access control systems, radio...
SecureVity ResearcherJan 10, 2025
Hardware Security

USB Rubber Ducky attack

A USB Rubber Ducky attack involves using a specially programmed USB device that mimics a keyboard to execute...
SecureVity ResearcherJan 10, 2025Jan 10, 2025
Hardware Security

Hardware fault induction attacks

Hardware fault induction attacks are a class of side-channel attacks where intentional faults are introduced into the hardware...
SecureVity ResearcherJan 10, 2025
Hardware Security

Chip Decapping Attack

A chip decapping attack involves physically removing the protective casing of a semiconductor device (usually an integrated circuit)...
SecureVity ResearcherJan 10, 2025Jan 10, 2025
Hardware Security

Voltage or clock glitching attack

Performing a voltage or clock glitching attack requires specialized equipment, a thorough understanding of the target system, and...
SecureVity ResearcherJan 10, 2025
Embedded Security

Embedded communication protocols

Embedded protocols are communication protocols specifically designed for use in embedded systems, which are dedicated systems that perform...
SecureVity ResearcherJan 10, 2025
IoT Security

Purdue Model-IT & OT

The Purdue Model, also known as the Purdue Enterprise Reference Architecture (PERA), is a framework used primarily in...
SecureVity ResearcherJan 10, 2025Jan 10, 2025
IoT Security

Modbus and Profinet

Modbus and Profinet are two widely used industrial communication protocols, but they differ in terms of technology, physical...
SecureVity ResearcherJan 10, 2025Jan 10, 2025
123
    Copyright © 2025    Yuki Ever Blog Theme Designed By WP Moose