The Duo Labs team analyzes the Bluetooth security of several different personal protection devices to shed light on how secure these devices are, and if they can be tracked remotely or reveal identifying information.
When it comes to Internet of Things (IoT) security research, you may run into roadblocks examining Bluetooth pairing and encryption between older devices and new ones - this blog post explains what you need to know to overcome them.
The Duo Labs security research team compares the features and capabilities of several Bluetooth scanners and software to best assist you in your security and IoT research.
Cut through the FUD (Fear, Uncertainty & Doubt) with a Duo Labs analysis of the recent series of Bluetooth vulnerabilities known as BlueBorne - and get our mitigation recommendations on how to keep your devices safe.
Get security conference OPSEC (operational security) tips from a senior security researcher who has seen it all - from trading trust for convenience to unattended personal items, learn how to lock it down when you’re on the road.
In his latest bit of odd research, Duo Labs' Mark Loveless takes a closer look at IoT as he pulls apart a wireless drill, bit by bit.
The emergency sirens were activated in Dallas County last Friday night at 11:42pm. First reported as a malfunction, it was later discovered to be a hack - here’s the technical details and why someone may have done it.
Before you head to the 2017 RSA Conference, get some quick survival tips from Mark Loveless of Duo Labs.
Duo Labs researcher Mark Loveless explores the importance of attribution and how it can be helpful if your company is attacked.
Holiday travel tests your personal data security. It’s easier to keep your money, identity and tech safe with tips from Duo’s Senior Security Researcher.
> What constitutes a backdoor in software, firmware, or even hardware? This question nagged at us during a recent project that Duo Labs worked on.
Find out more about the latest three vulnerabilities affecting iOS devices, and how many enterprise endpoints and phones are susceptible to these exploits.
A Duo Labs review of the USENIX Annual Technical Conference (ATC) 2016 in Denver, Colorado and the most interesting security talks on data deduplication, Blockstack, RC4 attacks and causal profiling.
A Duo Labs analysis of the recent critical vulnerability found in Symantec’s Antivirus Decomposer engine, used in Symantec Endpoint Protection and other Symantec and Norton security products, and discovered by Tavis Ormandy.
Bring Your Own Dilemma: OEM Laptops and Windows 10 Security Duo Labs / Featured Article
Security research team, Duo Labs, dissects OEM laptops to find out how secure they are - learn more about the privacy and security issues they found with laptop default settings, data collection and more.
Find out how you can disable your 2FA SMS passcodes to avoid interception by Android trojans and attackers - and use a more secure two-factor authentication method, like Duo Push.
The Glibc Project has announced a critical vulnerability affecting systems using the glibc DNS client-side resolver, that could, under certain conditions, lead to remote code execution on a system using glibc.
The whole Internet of Things (IoT) phenomenon has really gained momentum amongst security professionals as a hot topic of discussion. More than a few people are calling for self-examination...
This is a general guideline aimed at first-time attendees to Black Hat and DEF CON.