hardware

Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech

Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech 2025-07-15 at 09:00 By Mirko Zorz For decades, manufacturers and security professionals have been playing a high-stakes game of cat and mouse with counterfeiters. From holograms and QR codes to RFID tags and serial numbers, the industry’s toolkit has evolved, but so have the […]

React to this headline:

Loading spinner

Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech Read More »

IBM Power11 debuts with uptime, security, and energy efficiency upgrades

IBM Power11 debuts with uptime, security, and energy efficiency upgrades 2025-07-08 at 18:01 By Sinisa Markovic IBM unveiled Power11 today, a new generation of Power servers built to improve performance across processing, hardware, and virtualization. It’s designed to run reliably both on-site and in IBM’s hybrid cloud. Enterprises in banking, healthcare, retail and government depend

React to this headline:

Loading spinner

IBM Power11 debuts with uptime, security, and energy efficiency upgrades Read More »

Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC

Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC 2025-07-02 at 07:31 By Anamarija Pogorelec The Apricorn Aegis Secure Key 3NXC is a 256-bit AES XTS hardware-encrypted flash drive with a USB-C connector. It is available in storage capacities ranging from 4GB to 512GB and holds FIPS 140-2 Level 3 validation. The device

React to this headline:

Loading spinner

Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC Read More »

The tiny amplifier that could supercharge quantum computing

The tiny amplifier that could supercharge quantum computing 2025-06-25 at 09:34 By Anamarija Pogorelec Quantum computers are built to handle problems that are far too complex for today’s machines. They could lead to major advances in areas like drug development, encryption, AI, and logistics. Photo by Chalmers University of Technology Now, researchers at Chalmers University

React to this headline:

Loading spinner

The tiny amplifier that could supercharge quantum computing Read More »

Why should companies or organizations convert to FIDO security keys?

Why should companies or organizations convert to FIDO security keys? 2025-06-25 at 08:09 By Mirko Zorz In this Help Net Security interview, Alexander Summerer, Head of Authentication at Swissbit, explains how FIDO security keys work, what threats they address, and why they’re gaining traction across industries, from healthcare to critical infrastructure. He also shares insights

React to this headline:

Loading spinner

Why should companies or organizations convert to FIDO security keys? Read More »

Stealthy backdoor found hiding in SOHO devices running Linux

Stealthy backdoor found hiding in SOHO devices running Linux 2025-06-23 at 11:02 By Mirko Zorz SecurityScorecard’s STRIKE team has uncovered a network of compromised small office and home office (SOHO) devices they’re calling LapDogs. The threat is part of a broader shift in how China-Nexus threat actors are using Operational Relay Box (ORB) networks to

React to this headline:

Loading spinner

Stealthy backdoor found hiding in SOHO devices running Linux Read More »

GPS tracker detection made easy with off-the-shelf hardware

GPS tracker detection made easy with off-the-shelf hardware 2025-06-19 at 08:33 By Mirko Zorz Cyberstalkers are increasingly turning to cheap GPS trackers to secretly monitor people in real time. These devices, which often cost less than $30 and run on 4G LTE networks, are small, easy to hide under a bumper or in a glovebox,

React to this headline:

Loading spinner

GPS tracker detection made easy with off-the-shelf hardware Read More »

Thieves don’t need your car keys, just a wireless signal

Thieves don’t need your car keys, just a wireless signal 2025-06-19 at 08:01 By Sinisa Markovic A recent study by researchers at the University of Padova reveals that despite the rise in car thefts involving Remote Keyless Entry (RKE) systems, the auto industry has made little progress in strengthening security. Since RKE’s introduction in the

React to this headline:

Loading spinner

Thieves don’t need your car keys, just a wireless signal Read More »

Build a mobile hacking rig with a Pixel and Kali NetHunter

Build a mobile hacking rig with a Pixel and Kali NetHunter 2025-06-12 at 08:32 By Mirko Zorz A cybersecurity hobbyist has built a compact, foldable mobile hacking rig that runs Kali NetHunter on a Google Pixel 3 XL. It’s called the NetHunter C-deck, and it packs serious functionality into a small, 3D-printed shell. NetHunter C-deck

React to this headline:

Loading spinner

Build a mobile hacking rig with a Pixel and Kali NetHunter Read More »

Cisco’s new chip wants to scale quantum computing faster

Cisco’s new chip wants to scale quantum computing faster 2025-05-08 at 11:17 By Mirko Zorz Cisco is making significant strides in quantum computing by focusing on quantum networking, aiming to bring practical applications closer to reality. The company recently introduced a prototype of its Quantum Network Entanglement Chip and inaugurated the Cisco Quantum Lab in

React to this headline:

Loading spinner

Cisco’s new chip wants to scale quantum computing faster Read More »

Product showcase: Ledger Flex secure crypto wallet

Product showcase: Ledger Flex secure crypto wallet 2025-04-30 at 09:02 By Sinisa Markovic The Ledger Flex is a hardware wallet designed for the secure storage of cryptocurrencies and NFTs. It combines security features with a user-friendly interface, making it suitable for both beginners and more experienced users. Ledger Flex stores your private keys offline. This

React to this headline:

Loading spinner

Product showcase: Ledger Flex secure crypto wallet Read More »

Your smart home may not be as secure as you think

Your smart home may not be as secure as you think 2025-04-02 at 06:31 By Help Net Security The Internet of Things (IoT) has become a major part of daily life. Smartphones, smart thermostats, security cameras, and other connected devices make tasks easier and improve comfort, efficiency, and productivity. But as the number of devices

React to this headline:

Loading spinner

Your smart home may not be as secure as you think Read More »

Why rooting and jailbreaking make you a target

Why rooting and jailbreaking make you a target 2025-03-20 at 18:31 By Help Net Security As cybercriminals have moved to a mobile-first attack strategy, rooting and jailbreaking mobile devices remain a powerful attack vector. Such mobile devices bypass critical security protocols, leaving organizations vulnerable to mobile malware, data breaches, and complete system compromises. Threats reported

React to this headline:

Loading spinner

Why rooting and jailbreaking make you a target Read More »

CISOs, are your medical devices secure? Attackers are watching closely

CISOs, are your medical devices secure? Attackers are watching closely 2025-03-13 at 08:02 By Mirko Zorz The adoption of connected medical devices, collectively called the Internet of Medical Things (IoMT), has transformed patient care. However, this technological advancement has also introduced cybersecurity challenges to safeguard patient safety and uphold organizational security. Securing IoMT: Prioritizing risks

React to this headline:

Loading spinner

CISOs, are your medical devices secure? Attackers are watching closely Read More »

Sara: Open-source RouterOS security inspector

Sara: Open-source RouterOS security inspector 2025-01-09 at 07:03 By Mirko Zorz Sara is an open-source tool designed to analyze RouterOS configurations and identify security vulnerabilities on MikroTik hardware. Sara’s main feature is using regular expressions as the primary analysis mechanism. This allows you to quickly and accurately process RouterOS configuration text files, making the tool

React to this headline:

Loading spinner

Sara: Open-source RouterOS security inspector Read More »

Overlooking platform security weakens long-term cybersecurity posture

Overlooking platform security weakens long-term cybersecurity posture 2024-12-16 at 06:04 By Help Net Security Platform security – securing the hardware and firmware of PCs, laptops and printers – is often overlooked, weakening cybersecurity posture for years to come, according to HP. The report, based on a global study of 800+ IT and security decision-makers (ITSDMs)

React to this headline:

Loading spinner

Overlooking platform security weakens long-term cybersecurity posture Read More »

BadRAM: $10 hack unlocks AMD encrypted memory

BadRAM: $10 hack unlocks AMD encrypted memory 2024-12-11 at 13:16 By Mirko Zorz Cybersecurity researchers have identified a vulnerability (CVE-2024-21944, aka BadRAM) affecting ADM processors that can be triggered by rogue memory modules to unlock the chips’ encrypted memory. The SPD chip can be modified using an off-the-shelf microcontroller. The researchers used a Raspberry Pi

React to this headline:

Loading spinner

BadRAM: $10 hack unlocks AMD encrypted memory Read More »

How to choose secure, verifiable technologies?

How to choose secure, verifiable technologies? 2024-12-06 at 12:16 By Zeljka Zorz The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has published a guidance document titled Choosing Secure and Verifiable Technologies, compiled to assist organizations in making informed decisions when procuring software (proprietary or open source), hardware (e.g., IoT devices), and cloud services

React to this headline:

Loading spinner

How to choose secure, verifiable technologies? Read More »

Windows 365 Link: Connect securely to Windows 365

Windows 365 Link: Connect securely to Windows 365 2024-11-19 at 18:55 By Mirko Zorz Microsoft unveiled Windows 365 Link, their first purpose-built Cloud PC device for instant, secure connection to Windows 365. Sign-in screen with USB security key option (Source: Microsoft) Windows 365 Link prioritizes security “We have heard concerns from IT pros about the

React to this headline:

Loading spinner

Windows 365 Link: Connect securely to Windows 365 Read More »

Inside console security: How innovations shape future hardware protection

Inside console security: How innovations shape future hardware protection 2024-10-29 at 08:00 By Mirko Zorz In this Help Net Security interview, security researchers Specter and ChendoChap discuss gaming consoles’ unique security model, highlighting how it differs from other consumer devices. They also share their thoughts on how advancements in console security could shape future consumer

React to this headline:

Loading spinner

Inside console security: How innovations shape future hardware protection Read More »

Scroll to Top