NEWS

pnt Defending the Grid Against Cyber Sabotage Energy Central, 10.12.2018
pnt Security must evolve with connectivity if automobiles are to stay safe Intelligent Transport, 07.30.2018
pnt The Overlooked Problem of 'N-Day' Vulnerabilities Dark Reading, 03.26.2018
pnt A New Way to Track Down Bugs Could Help Save IoT Wired, 01.18.2018
pnt A cybersecurity expert showed us how hackers can tap into an office phone and listen to everything you're saying Business Insider, 11.29.2017
pnt Hackers can gain access to your computer monitor — a cybersecurity expert shows us how easy it is Business Insider, 11.06.2017
pnt A Brief History of Symbiote Defense Medium, 10.16.2017
pnt Red Balloon announces Symbiote for Automotive Defense to save your car from being hacked Digit, 06.27.2017
pnt This software wants to protect millions of cars from hackers Road Show by CNET, 06.21.2017
pnt A Diabolical Way of Hackin a Chip with a Wave of Your Hand Wired, 06.21.2017
pnt Red Balloon Security Inc. Wins $2.54 Million Federal Contract Bloomberg, 06.08.2017
pnt These Are Some Frightening Ways Your Office Tech Can Compromise Employee Data Fast Company, 02.14.2017
pnt Red Balloon Security Announces Advanced Host Based Security For Embedded Devices Dark Reading, 09.24.2015
pnt Hacker Turns Secure Computers Into Secret-Spewing Radios PC Mag, 08.06.2015
pnt U.S. researchers show computers can be hijacked to send data as sound waves Reuters, 08.05.2015
pnt How To Turn a Cheap Printer Into A Stealthy Bugging Device Motherboard, 08.05.2015
pnt Computers Can Be Hacked to Send Data as Sound Waves: Researchers NBC News, 08.05.2015
pnt How your washing machine can steal computer files CNN, 08.05.2015
pnt How to turn a phone into a covert bugging device? Infect the printer Arstechnica, 02.28.2014
pnt Meet the Symbiote: The Ironclad, Adaptable Future of Antivirus Protection Gizmodo, 02.26.2013
pnt A Guide to Spying on Cisco Phone Calls The New York Times, 02.05.2013
pnt Eavesdropping on your phone from anywhere in the world Fox News, 01.08.2013
pnt Cisco IP Phones Hacked Fast Company, 12.19.2012
pnt Cisco VoIP Phones Affected By On Hook Security Vulnerability Forbes, 12.06.2012
pnt Auto-Immune: "Symbiotes" Could Be Deployed to Thwart Cyber Attacks Yahoo, 11.26.2012
pnt HACKERS CAN REMOTELY SET ABLAZE HP PRINTERS, RESEARCHERS SAY Wired, 11.29.2011

VIDEO

Finding N-Day Vulnerabilities in ICS Embedded Devices

S4 Events, 04.02.2018

Hackers Can Compromise Your Computer Monitor

Tech Insider, 11.16.2017

Funny Business | The Fixer ft. Jonathan Banks | HP

HP, 09.11.2017

The Wolf ft. Christian Slater

HP, 02.14.2017

A Monitor Darkly - Reversing and Exploiting Ubiquitous

DEF CON 24, 08.04.2016

How Hackers Could Wirelessly Bug Your Office

Motherboard, 06.29.2016

Emanate Like A Boss: Generalized Covert Data Exfiltration With Funtenna

Black Hat, 08.01.2015

Defending All Insecure Embedded Devices with Symbiote Technology

U.S. Department of Homeland Security, 07.20.2015

Watch Red Balloon Security Pitch at HADD

HADD, 02.12.2015

Stepping P3wns: Adventures in Full Spectrum Embedded Exploitation & Defense

RSA Conference, 05.08.2014

DEF CON 21 - Ang Cui and Michael Costello - Stepping P3wns

DEF CON 21, 12.17.2013

DEF CON 20 - Ang Cui - Embedded Device Firmware Vulnerability Hunting Using FRAK

DEF CON 20, 10.30.2013