| Interested in espionage and security? Join the Elektor Spy Contest! Read carefully through Luka Matic's book and try to find better answers...
| Interested in espionage and security? Join the Elektor Spy Contest! Read carefully through Luka Matic's book and try to find better answers...
| Looking for a good book to get you through Christmas? How about the “Handbook on DIY Electronic Security and Espionage”? Learn all the trick...
| If you are interested in espionage and security, you may like to participate in our Spy Contest! Analyze my book, find (better) answers/solu...
| This is a submission from Apacer on a series of rugged industrial SSDs, which uses industrial-grade wide-temperature ICs sourced directly fr...
| SD cards are small, cheap, lightweight, and fast, and they can hold many gigabytes of data. However, because of their physical properties, t...
| In a recently released preliminary report by the US House Transportation Committee criticism is levelled not only at Boeing for engineering...
| Alice likes to keep her conversations with Bob private. Secure communication schemes are necessary to hide information from Eavesdropping Ev...
| Mobile devices such as smartphones are currently protected from improper use by a password, swipe gesture and fingerprint or face recognitio...
| Is it over yet? Last weekend, the big story was of course the Ransomware attack that succeeded in infecting, encrypting and crippling around...
| Here are some goodies (source code, tools and documentation) to play with the Elektor E-lock* Secure Server Board (130280).