Software Defined Radio: A Hacker’s Dream
Wireless cameras, RFID key cards, keyboards, cordless phones, just about every wireless technology that isn’t light- or sound-based will attract a hoard of researchers (and attackers) looking at ways to exploit them. Are you prepared? It is now known that your car’s GPS, toaster and medical devices are vulnerable to attack. For the most part, built without…
Details