Full Disclosure mailing list archives

Perverting Embedded Devices - ZKSoftware Fingerprint Reader (Part I)


From: Francisco Amato <famato () infobytesec com>
Date: Fri, 8 Aug 2014 17:31:26 -0300

Hi list,
I would like to share the following blog post about ZKSoftware Fingerprint
Reader vulnerabilities:
*http://blog.infobytesec.com/2014/07/perverting-embedded-devices-zksoftware_2920.html
<http://blog.infobytesec.com/2014/07/perverting-embedded-devices-zksoftware_2920.html>*

Best

--
FRANCISCO AMATO
Chief Executive Officer
Infobyte LLC
Linkedin: http://www.linkedin.com/in/famato
Twitter: http://twitter.com/famato

HQ +1 305 851 3373
2699 S. Bayshore Dr #300.
[33133], Miami, FL

<http://www.linkedin.com/company/infobyte-security-research>
<https://twitter.com/infobytesec>  <https://www.facebook.com/Infobytesec>
<http://blog.infobytesec.com/>  <http://www.infobytesec.com/>

Know about *Faraday*, our multiuser Penetration test IDE. *Click here.*
<http://www.faradaysec.com/>

_______________________
CONFIDENTIALITY NOTICE: This e-mail message, including any attachments,
is being sent by Infobyte for the sole use of the intended recipient(s) and
may contain confidential, proprietary and/or privileged information.
Any unauthorized review, use, disclosure and/or distribution by any
recipient is prohibited. If you are not the intended recipient, please
delete and/or destroy all copies of this message regardless of form and
any included attachments and notify Infobyte immediately by contacting the
sender via reply e-mail or forwarding to Infobyte at infox () infobytesec com.

_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


Current thread: