Top

Tag: hardware


Threats & Malware, Vulnerabilities

Raspberry Pi Pico cracks BitLocker in under a minute

February 7, 2024

Via: The Register

We’re very familiar with the many projects in which Raspberry Pi hardware is used, from giving old computers a new lease of life through to running the animated displays so beloved by retailers. But cracking BitLocker? We doubt the company […]


Mobile, Mobile security

Kaspersky reveals previously unknown hardware ‘feature’ exploited in iPhone attacks

December 28, 2023

Via: The Register

Kaspersky’s Global Research and Analysis Team (GReAT) has exposed a previously unknown “feature” in Apple iPhones that allowed malware to bypass hardware-based memory protection. Addressed as CVE-2023-38606, which was patched in July 2023, the issue affected iPhones running iOS versions […]


Threats & Malware, Vulnerabilities

Weak session keys let snoops take a byte out of your Bluetooth traffic

November 30, 2023

Via: The Register

Multiple Bluetooth chips from major vendors such as Qualcomm, Broadcom, Intel, and Apple are vulnerable to a pair of security flaws that allow a nearby miscreant to impersonate other devices and intercept data. The weaknesses were identified by Daniele Antonioli, […]


Privacy protection, Security

Security beyond software: The open source hardware security evolution

April 19, 2023

Via: Help Net Security

Mention IT security, and most people immediately think of software-based protections against software-based threats: ransomware, viruses, and other forms of malware. But recognition of the importance of hardware security—upon which all software security is built—is (thankfully) also growing. Established hardware […]


Threats & Malware, Vulnerabilities

Unpatchable Hardware Vulnerability Allows Hacking of Siemens PLCs

January 11, 2023

Via: Security Week

Exploitation of the vulnerability, tracked as CVE-2022-38773, could allow an attacker to bypass protected boot features and persistently modify the controller’s operating code and data. The cause, according to Red Balloon Security, is a series of architectural issues affecting Siemens […]


Threats & Malware, Vulnerabilities

Critical ‘Pantsdown’ BMC Vulnerability Affects QCT Servers Used in Data Centers

May 26, 2022

Via: The Hacker News

Quanta Cloud Technology (QCT) servers have been identified as vulnerable to the severe “Pantsdown” Baseboard Management Controller (BMC) flaw, according to new research published today. “An attacker running code on a vulnerable QCT server would be able to ‘hop’ from […]


Threats & Malware, Vulnerabilities

Disrupting a power grid with cheap equipment hidden in a coffee cup

August 20, 2020

Via: Help Net Security

Cyber-physical systems security researchers at the University of California, Irvine can disrupt the functioning of a power grid using about $50 worth of equipment tucked inside a disposable coffee cup. Mohammad Al Faruque, UCI associate professor of electrical engineering and […]


Mobile, Mobile security

Facial recognition hardware to reach over 800 million devices by 2024

January 7, 2020

Via: Help Net Security

A new report from Juniper Research found that facial recognition hardware, such as Face ID on recent iPhones, will be the fastest growing form of smartphone biometric hardware. This means it will reach over 800 million in 2024, compared to […]


Hacker, Threats & Malware

Hardware hacks: The next generation of cybercrime

December 19, 2019

Via: Help Net Security

Every 39 seconds there is a cyber attack affecting one out of three Americans. All organizations need to take proactive measures and think like the attackers that are infiltrating their networks. Despite the fact that businesses around the world are […]


Network security

Microsoft debuts hardware-rooted security for foiling firmware attacks

October 22, 2019

Via: Help Net Security

Microsoft partnered with mainstream chip and computer makers to deliver hardware protection of firmware right out of the box: the so-called Secured-core PCs are aimed at foiling attackers who rely on exploiting firmware vulnerabilities to surreptitiously gain access to computer […]


Network security

Spending on security hardware, software, and services continues to increase

October 21, 2019

Via: Help Net Security

Worldwide spending on security products and services will enjoy solid growth over the next five years as organizations continue to invest in solutions to meet a wide range of security threats and requirements. According to an updated forecast from the […]


Threats & Malware, Virus & Malware

Researchers fight ransomware attacks by leveraging properties of flash-based storage

May 31, 2019

Via: Help Net Security

Ransomware continues to pose a serious threat to organizations of all sizes. In a new paper, “Project Almanac: A Time-Traveling Solid State Drive,” University of Illinois students Chance Coats and Xiaohao Wang and Assistant Professor Jian Huang from the Coordinated […]


Privacy protection, Vulnerabilities

Apple Modernizes Its Hardware Security with T2

November 8, 2018

Via: Threat Post

Apple has widened the range of Macs running its T2 security chip. Is macOS finally catching up with other platforms when it comes to secure computing? When Apple launched its latest MacBook Air last month, one of its more unusual […]


Network security, Vulnerabilities

Software is Achilles Heel of Hardware Cryptocurrency Wallets

July 24, 2018

Via: Dark Reading

Cryptocurrency exchanges and private wallets have been fully in cyberattacker crosshairs as criminals seek to make the most of an exploding new financial market that some analysts say will reach $1 trillion by the end of the year. In response […]


Mobile security, Privacy protection

Privacy, security concerns grow for wearables

June 20, 2017

Via: Help Net Security

While Google Glass was not the success Google wanted it to be, there is no doubt that the wearable camera market is growing. People may have not been comfortable with the fact that random persons can record their action without […]


Mobile security, Network security

Healthcare industry continues to struggle with software security

May 30, 2017

Via: Help Net Security

67% of medical device manufacturers and 56% of healthcare delivery organizations (HDOs) believe an attack on a medical device built or in use by their organizations is likely to occur over the next 12 months. According to the results of […]


Vulnerabilities

Nintendo targets 3DS vulnerabilities in new bug bounty

December 8, 2016

Via: Naked Security

Nintendo has announced it’s now supporting a bug bounty program for researchers to find flaws in its 3DS family of handheld game consoles. Researchers could make up to $20,000 for discovering vulnerabilities for the 3DS that could be used for pirating […]


Mobile, Mobile security

What this expensive ‘secure’ phone tells us about mobile hacking

September 6, 2016

Via: CIO

Mobile security is a bit of a misnomer. Few of us can say we’ve been attacked by a piece of malware or have quarantined an actual virus. The odds are stacked against us. Mobile operators like Verizon and Sprint routinely […]


Data loss

Most used drives sold on eBay hold personal information

June 30, 2016

Via: Help Net Security

E-commerce sites are reselling used electronics without permanently erasing data from them. Based on an analysis of 200 second-hand hard disk drives and solid state drives purchased from eBay and Craigslist in the first quarter of 2016, Blancco Technology Group […]


Cloud security

New server and cloud solutions unveiled at OpenPOWER Summit 2015

March 18, 2015

Via: cloud-security

The first annual OpenPOWER Foundation summit showcases new #hardware and #cloud services that utilize IBM’s freely licensable #processor technology, which adds developer-friendly changes. IBM unveiled in August 2013 the POWER8 family of processors, and announced that the POWER architecture would […]