Escape from Imprisonment
As someone who has used the ADSL modem of internet service providers for years and conducted security research on them (such as “How Secure are ISP Modems?” and “The Importance of Firmware Analysis”), I...
Read More1 Apr 2019 | Cybersecurity, English |
As someone who has used the ADSL modem of internet service providers for years and conducted security research on them (such as “How Secure are ISP Modems?” and “The Importance of Firmware Analysis”), I...
Read More1 Mar 2018 | Cybersecurity, English |
In the beginning of 2012, as I began receiving invitations to give presentations, I decided that my first task would be to purchase a wireless presentation remote for myself. As I searched for one that would not disappoint me in...
Read More1 Feb 2018 | Cybersecurity, English |
A few months ago, upon my spouse’s need, I began searching for a printer. As someone who hadn’t owned a printer in their home for the past 15 years, I was pleased to find that the prices of printers on e-commerce...
Read More1 Dec 2017 | Cybersecurity, English |
In 2015, I came across a product set that was on sale in an electronics store. If you bought Kaspersky Internet Security software, you would receive a Microsoft Sculpt Mobile model wireless mouse as a gift. I bought it without...
Read More3 Jul 2017 | Cybersecurity, English |
I have been hearing this question more and more frequently from many people around me, both those I know and those I don’t know, in recent years: “My data has been encrypted, they’re asking for money, what can...
Read More