“Find – Bluetooth Tracker” Responsible Vulnerability Disclosure – Blog
Introduction: With the advent of IoT, everything is getting connected to the internet. Bluetooth is one such protocol which is used to connect devices to the internet as the most mobile…
IoT Security – Part 4 (Bluetooth Low Energy – 101)

Bluetooth Low Energy 101 If you haven’t read through Part 1 to Part 3 of our IoT Security Blog series I would urge you to go through them first unless you…
How I Reverse Engineered and Exploited a Smart Massager
I have been working with Bluetooth for quite some time. I chose to reverse engineer a smart device to prove how crazy is the security standard being implemented in these…