Threats & Malware, Vulnerabilities
February 7, 2024
Via: The RegisterWe’re very familiar with the many projects in which Raspberry Pi hardware is used, from giving old computers a new lease of life through to running the animated displays so beloved by retailers. But cracking BitLocker? We doubt the company […]
December 28, 2023
Via: The RegisterKaspersky’s Global Research and Analysis Team (GReAT) has exposed a previously unknown “feature” in Apple iPhones that allowed malware to bypass hardware-based memory protection. Addressed as CVE-2023-38606, which was patched in July 2023, the issue affected iPhones running iOS versions […]
Threats & Malware, Vulnerabilities
November 30, 2023
Via: The RegisterMultiple Bluetooth chips from major vendors such as Qualcomm, Broadcom, Intel, and Apple are vulnerable to a pair of security flaws that allow a nearby miscreant to impersonate other devices and intercept data. The weaknesses were identified by Daniele Antonioli, […]
April 19, 2023
Via: Help Net SecurityMention IT security, and most people immediately think of software-based protections against software-based threats: ransomware, viruses, and other forms of malware. But recognition of the importance of hardware security—upon which all software security is built—is (thankfully) also growing. Established hardware […]
Threats & Malware, Vulnerabilities
January 11, 2023
Via: Security WeekExploitation of the vulnerability, tracked as CVE-2022-38773, could allow an attacker to bypass protected boot features and persistently modify the controller’s operating code and data. The cause, according to Red Balloon Security, is a series of architectural issues affecting Siemens […]
Threats & Malware, Vulnerabilities
May 26, 2022
Via: The Hacker NewsQuanta Cloud Technology (QCT) servers have been identified as vulnerable to the severe “Pantsdown” Baseboard Management Controller (BMC) flaw, according to new research published today. “An attacker running code on a vulnerable QCT server would be able to ‘hop’ from […]
Threats & Malware, Vulnerabilities
August 20, 2020
Via: Help Net SecurityCyber-physical systems security researchers at the University of California, Irvine can disrupt the functioning of a power grid using about $50 worth of equipment tucked inside a disposable coffee cup. Mohammad Al Faruque, UCI associate professor of electrical engineering and […]
January 7, 2020
Via: Help Net SecurityA new report from Juniper Research found that facial recognition hardware, such as Face ID on recent iPhones, will be the fastest growing form of smartphone biometric hardware. This means it will reach over 800 million in 2024, compared to […]
December 19, 2019
Via: Help Net SecurityEvery 39 seconds there is a cyber attack affecting one out of three Americans. All organizations need to take proactive measures and think like the attackers that are infiltrating their networks. Despite the fact that businesses around the world are […]
October 22, 2019
Via: Help Net SecurityMicrosoft partnered with mainstream chip and computer makers to deliver hardware protection of firmware right out of the box: the so-called Secured-core PCs are aimed at foiling attackers who rely on exploiting firmware vulnerabilities to surreptitiously gain access to computer […]
October 21, 2019
Via: Help Net SecurityWorldwide spending on security products and services will enjoy solid growth over the next five years as organizations continue to invest in solutions to meet a wide range of security threats and requirements. According to an updated forecast from the […]
Threats & Malware, Virus & Malware
May 31, 2019
Via: Help Net SecurityRansomware continues to pose a serious threat to organizations of all sizes. In a new paper, “Project Almanac: A Time-Traveling Solid State Drive,” University of Illinois students Chance Coats and Xiaohao Wang and Assistant Professor Jian Huang from the Coordinated […]
Privacy protection, Vulnerabilities
November 8, 2018
Via: Threat PostApple has widened the range of Macs running its T2 security chip. Is macOS finally catching up with other platforms when it comes to secure computing? When Apple launched its latest MacBook Air last month, one of its more unusual […]
Network security, Vulnerabilities
July 24, 2018
Via: Dark ReadingCryptocurrency exchanges and private wallets have been fully in cyberattacker crosshairs as criminals seek to make the most of an exploding new financial market that some analysts say will reach $1 trillion by the end of the year. In response […]
Mobile security, Privacy protection
June 20, 2017
Via: Help Net SecurityWhile Google Glass was not the success Google wanted it to be, there is no doubt that the wearable camera market is growing. People may have not been comfortable with the fact that random persons can record their action without […]
Mobile security, Network security
May 30, 2017
Via: Help Net Security67% of medical device manufacturers and 56% of healthcare delivery organizations (HDOs) believe an attack on a medical device built or in use by their organizations is likely to occur over the next 12 months. According to the results of […]
December 8, 2016
Via: Naked SecurityNintendo has announced it’s now supporting a bug bounty program for researchers to find flaws in its 3DS family of handheld game consoles. Researchers could make up to $20,000 for discovering vulnerabilities for the 3DS that could be used for pirating […]
September 6, 2016
Via: CIOMobile security is a bit of a misnomer. Few of us can say we’ve been attacked by a piece of malware or have quarantined an actual virus. The odds are stacked against us. Mobile operators like Verizon and Sprint routinely […]
June 30, 2016
Via: Help Net SecurityE-commerce sites are reselling used electronics without permanently erasing data from them. Based on an analysis of 200 second-hand hard disk drives and solid state drives purchased from eBay and Craigslist in the first quarter of 2016, Blancco Technology Group […]
March 18, 2015
Via: cloud-securityThe first annual OpenPOWER Foundation summit showcases new #hardware and #cloud services that utilize IBM’s freely licensable #processor technology, which adds developer-friendly changes. IBM unveiled in August 2013 the POWER8 family of processors, and announced that the POWER architecture would […]