Raspberry Pi
Fly Catcher: Detect aircraft spoofing by monitoring for malicious signals
Fly Catcher is an open-source device that can detect aircraft spoofing by monitoring for malicious ADS-B signals in the 1090MHz frequency. Angelina Tsuboi, the developer of …
Passbolt: Open-source password manager for security-conscious organizations
In this Help Net Security interview, Kevin Muller, CEO at Passbolt, delves into the critical concerns linked to password usage, outlines how the Passbolt password manager …
Attackers using default credentials to target businesses, Raspberry Pi and Linux top targets
Findings from a Bulletproof report highlight the issue posed by poor security hygiene as automated attacks remain a high security threat to businesses. The research gathered …
Nessus 10 is out, with Raspberry Pi support
Tenable has released Nessus 10 and extended supported platforms to include Raspberry Pi, allowing penetration testers, consultants, security teams and students to deploy the …
Edge Impulse raises $15M to democratize ML for developers and engineers
Edge Impulse announced the closing of a $15 million Series A investment round led by Canaan Partners with Acrew Capital, Fika Ventures, Momenta Ventures, and Knollwood …
RemotePC adds new features for Linux remote access
RemotePC has updated their remote access for Linux offering with new features: Linux Remote Sound – enables users to listen to audio files from the remote machine on …
CloudLinux KernelCare now supports Raspberry Pi, improving security for IoT deployments
CloudLinux announced that its KernelCare service now supports the Raspberry Pi platform providing live patching for the running kernel with zero downtime — improving …
Penetration Testing With Raspberry Pi
Authors: Joseph Muniz, Aamir LakhaniPages: 142 pagesPublisher: Packt PublishingISBN: 1784396435 Introduction Raspberry Pi is a small and portable single board computer that …
Featured news
Resources
Don't miss
- Veeam plugs serious holes in Service Provider Console (CVE-2024-42448, CVE-2024-42449)
- Whitepaper: 9 traits of effective cybersecurity leaders of tomorrow
- Phishers send corrupted documents to bypass email security
- Treat AI like a human: Redefining cybersecurity
- Best practices for staying cyber secure during the holidays