security

Build The Future For Medical Device Hacking

Stephen and Lani are both student cyber security researchers who are trying to innovate the future. We were among the first to exploit a power wheelchair physically and since then, we have begun improving this research. We are working on making power-wheelchairs autonomous (self-driving) and are also looking into the possibility of using Brain-Computer Interface (BCI) to make wheelchairs operable with your mind. Our research has opened many doors in multiple areas like information security, medical device hacking, and helped to earn presenting spots in globally recognized conferences like DEFCON, GeekPwn, and Kaspersky Security Analyst Summit.

Is Security an Economic Problem?

Is Security an Economic Problem? This post attempts to address an issue that is controversial in nature, but will (in my opinion) nevertheless become important, and will inevitably have to be addressed. Do not read this post as a call for change, but as a call for thought and open discussion. This may be a unique opportunity to discuss a topic before it becomes a problem in practice and the emotions set in.

GeekPwn 2016

I always wanted to write a blog post about the entire experience since so many people kept asking about the trip. I found some time to do so. I hope you find this blog post very interesting and fun to read! GeekPwn Main Stage Attacking power-wheelchairs GeekPwn was my 2nd information security conference, but also the 1st international conference I went to while I was in my last semester at MSU Denver.

Exploiting Wildcard Expansion on Linux

Wildcard Expansion When you type a command with a “*“ in bash, bash expands it to the list of all files in the directory and passes them all as arguments to the program. For example, “rm *“ , will remove files in the current directory. Filenames Misinterpreted as Switches Most command line programs can take switches that affect how they work. For example, the ls command, when ran without any switches, looks like the output below.