Showing 3 results

45:07
Remote Exploitation of Nissan Leaf: Controlling Critical Body Elements from the Internet
Black Hat
5 months ago
Travel & Eventsresearch-presentationtechnical-deep-diveautomotive

30:13
Unveiling New Attack Vectors in Bluetooth Vulnerability Discovery through Protocol State Machine
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridbluetooth

36:35
Travel & Eventsresearch-presentationhybriddashcam