dipole-security.fr
Open in
urlscan Pro
51.91.111.15
Public Scan
URL:
https://dipole-security.fr/
Submission: On November 11 via automatic, source certstream-suspicious — Scanned from FR
Submission: On November 11 via automatic, source certstream-suspicious — Scanned from FR
Form analysis
0 forms found in the DOMText Content
Menu * Services * About DIPOLE SECURITY IoT Security for all SERVICES ABOUT Researcher and IoT Hacker, my main mission is to evangelise companies to take care about security from the design step. I work on internal and external offensive security analysis and assessment of security maturity of embedded systems upstream their industrialization. . Since the beginning of IoT, I specializes myself in vulnerabilities research adapted to the embedded systems but also awareness of designers, developers and integrators. I take advantage of security events and working groups to campaign for a less vulnerable IoT world. LOCATION Toulouse France MEET US ON SOCIAL NETWORK CONTACT contact[at]dipole-security.fr SECURITY EVALUATION IoT is a growing market and will be the future of our daily lives. Because of its emergence, there is no standard to guide the development process, there are many protocols and custom solutions to connect a hardware device to a cloud. Before go to market, it's recommanded to evaluate the risk level of your IoT device. Let's us to help you against opportunist attacker and just send us one of your device to evaluate its security. Close Window TRAINING IoT is a growing market and will be the future of our daily lives. Because of its emergence, there is no standard to guide the development process, there are many protocols and custom solutions to connect a hardware device to a cloud. Sometimes, middleware (like a smartphone application) could be encountered between the hardware and the cloud. This IoT course will explain IoT concepts, IoT construction and security holes. Each student will train themself on a dedicated open sourced vulnerable board. They will be able to improve their skill to find vulnerabilities and learn how avoid them during development. Close Window GAMING CORNER You will take part one the first IoT Escape Game, based on the DVID project About the Escape Game storyboard, the company has developed an industrial system to monitor the temperature of high sensitive area. The system is installed on a secured datacenter and monitor the temperature of racks. The system is composed by a sensor (the DVID board), an appliance (local monitor ouside the secured area) and a cloud service for alert. The mission is simple : Your CISO is asking you to investigate about a security failure on the temperature monitor system, your subcontractor seems to have been hacked and a backdoor might be installed. You have one hour to investigate and, if a backdoor is found, try to defuse it. Close Window