hardware

Android 15 unveils new security features to protect sensitive data

Android 15 unveils new security features to protect sensitive data 2024-10-16 at 13:20 By Help Net Security Android 15 brings enhanced security features to protect your sensitive health, financial, and personal data from theft and fraud. It also introduces productivity improvements for large-screen devices and updates to apps like the camera, messaging, and passkeys. Android […]

React to this headline:

Loading spinner

Android 15 unveils new security features to protect sensitive data Read More »

The growing danger of visual hacking and how to protect against it

The growing danger of visual hacking and how to protect against it 2024-09-17 at 07:01 By Mirko Zorz In this Help Net Security interview, Robert Ramsey, CEO at Rain Technology, discusses the growing threat of visual hacking, how it bypasses traditional cybersecurity measures, and the importance of physical barriers like switchable privacy screens. Could you

React to this headline:

Loading spinner

The growing danger of visual hacking and how to protect against it Read More »

Vulnerability allows Yubico security keys to be cloned

Vulnerability allows Yubico security keys to be cloned 2024-09-04 at 13:31 By Zeljka Zorz Researchers have unearthed a cryptographic vulnerability in popular Yubico (FIDO) hardware security keys and modules that may allow attackers to clone the devices. But the news is not as catastrophic as it may seem at first glance. “The attacker would need

React to this headline:

Loading spinner

Vulnerability allows Yubico security keys to be cloned Read More »

OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware

OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware 2024-08-07 at 09:16 By Help Net Security Forescout has published a new report examining the current state of the software supply chain in OT/IoT routers. The study uncovered that OT and IoT cellular routers and those used in small offices and homes contain outdated software components

React to this headline:

Loading spinner

OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware Read More »

Firmware update hides Bluetooth fingerprints

Firmware update hides Bluetooth fingerprints 2024-07-16 at 07:03 By Help Net Security A smartphone’s unique Bluetooth fingerprint could be used to track the device’s user–until now. A team of researchers has developed a simple firmware update that can completely hide the Bluetooth fingerprint, eliminating the vulnerability. Bluetooth signals from mobile devices pose privacy risks The

React to this headline:

Loading spinner

Firmware update hides Bluetooth fingerprints Read More »

Intel-powered computers affected by serious firmware flaw (CVE-2024-0762)

Intel-powered computers affected by serious firmware flaw (CVE-2024-0762) 2024-06-21 at 14:31 By Zeljka Zorz A vulnerability (CVE-2024-0762) in the Phoenix SecureCore UEFI, which runs on various Intel processors, could be exploited locally to escalate privileges and run arbitrary code within the firmware during runtime. “This type of low-level exploitation is typical of firmware backdoors (e.g.,

React to this headline:

Loading spinner

Intel-powered computers affected by serious firmware flaw (CVE-2024-0762) Read More »

20,000 FortiGate appliances compromised by Chinese hackers

20,000 FortiGate appliances compromised by Chinese hackers 2024-06-12 at 14:16 By Zeljka Zorz Coathanger – a piece of malware specifically built to persist on Fortinet’s FortiGate appliances – may still be lurking on too many devices deployed worldwide. How Coathanger persists on FortiGate devices In February 2024, the Dutch Military Intelligence and Security Service (MIVD)

React to this headline:

Loading spinner

20,000 FortiGate appliances compromised by Chinese hackers Read More »

How secure is the “Password Protection” on your files and drives?

How secure is the “Password Protection” on your files and drives? 2024-05-10 at 08:31 By Help Net Security People in certain professions, such as healthcare, law, and corporations, often rely on password protection when sending files via email, believing it provides adequate security against prying eyes. However, simple password protection on a PDF or Excel

React to this headline:

Loading spinner

How secure is the “Password Protection” on your files and drives? Read More »

Researchers unveil novel attack methods targeting Intel’s conditional branch predictor

Researchers unveil novel attack methods targeting Intel’s conditional branch predictor 2024-04-29 at 13:46 By Help Net Security Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use. The multi-university and industry research team led

React to this headline:

Loading spinner

Researchers unveil novel attack methods targeting Intel’s conditional branch predictor Read More »

Crypto-like communication devices could break gov’t surveillance — Telegram founder

Crypto-like communication devices could break gov’t surveillance — Telegram founder 2024-04-17 at 12:02 By Cointelegraph by Arijit Sarkar Pavel Durov, founder of Telegram Messenger, believes that governments’ decreasing tolerance toward privacy will force innovations around secure communication hardware devices. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

Crypto-like communication devices could break gov’t surveillance — Telegram founder Read More »

io.net adds Apple chip support to its cloud-based GPU-sourcing network

io.net adds Apple chip support to its cloud-based GPU-sourcing network 2024-03-13 at 16:03 By Cointelegraph by Gareth Jenkinson Io.net will support Apple silicon chips, allowing users to use the hardware for machine learning applications. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

io.net adds Apple chip support to its cloud-based GPU-sourcing network Read More »

AI PC shipments are expected to surpass 167 million units by 2027

AI PC shipments are expected to surpass 167 million units by 2027 2024-02-15 at 06:01 By Help Net Security Shipments of AI PCs – personal computers with specific system-on-a-chip (SoC) capabilities designed to run generative AI tasks locally – are expected to grow from nearly 50 million units in 2024 to more than 167 million

React to this headline:

Loading spinner

AI PC shipments are expected to surpass 167 million units by 2027 Read More »

CISOs’ role in identifying tech components and managing supply chains

CISOs’ role in identifying tech components and managing supply chains 2024-01-25 at 07:01 By Mirko Zorz In this Help Net Security interview, Nate Warfield, Director of Threat Research and Intelligence at Eclypsium, outlines the crucial tasks for CISOs in protecting supply chains and achieving comprehensive visibility. Warfield also discusses the vital collaboration between security and

React to this headline:

Loading spinner

CISOs’ role in identifying tech components and managing supply chains Read More »

Fly Catcher: Detect aircraft spoofing by monitoring for malicious signals

Fly Catcher: Detect aircraft spoofing by monitoring for malicious signals 2024-01-10 at 07:02 By Mirko Zorz Fly Catcher is an open-source device that can detect aircraft spoofing by monitoring for malicious ADS-B signals in the 1090MHz frequency. Angelina Tsuboi, the developer of Fly Catcher, is an enthusiastic pilot, cybersecurity researcher, and tinkerer. She was driven

React to this headline:

Loading spinner

Fly Catcher: Detect aircraft spoofing by monitoring for malicious signals Read More »

Citrix Bleed: Mass exploitation in progress (CVE-2023-4966)

Citrix Bleed: Mass exploitation in progress (CVE-2023-4966) 30/10/2023 at 14:46 By Zeljka Zorz CVE-2023-4966, aka “Citrix Bleed”, a critical information disclosure vulnerability affecting Citrix NetScaler ADC/Gateway devices, is being massively exploited by threat actors. According to security researcher Kevin Beaumont’s cybersecurity industry sources, one ransomware group has already distributed a Python script to automate the

React to this headline:

Loading spinner

Citrix Bleed: Mass exploitation in progress (CVE-2023-4966) Read More »

IBM’s new AI chip offers 22X speedup with ‘mind-blowing’ energy efficiency

IBM’s new AI chip offers 22X speedup with ‘mind-blowing’ energy efficiency 20/10/2023 at 21:02 By Cointelegraph By Tristan Greene The team’s already years into work on the next version of the potentially revolutionary NorthPole hardware. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

IBM’s new AI chip offers 22X speedup with ‘mind-blowing’ energy efficiency Read More »

Inadequate IoT protection can be a costly mistake

Inadequate IoT protection can be a costly mistake 16/10/2023 at 06:34 By Help Net Security 97% of organizations are struggling to secure their IoT and connected products to some degree, according to Keyfactor. The research survey also found that 98% of organizations experienced certificate outages in the last 12 months, costing an average of over

React to this headline:

Loading spinner

Inadequate IoT protection can be a costly mistake Read More »

Bruschetta-Board: Multi-protocol Swiss Army knife for hardware hackers

Bruschetta-Board: Multi-protocol Swiss Army knife for hardware hackers 12/09/2023 at 06:02 By Help Net Security Bruschetta-Board is a device for all hardware hackers looking for a fairly-priced all-in-one debugger and programmer that supports UART, JTAG, I2C & SPI protocols and allows to interact with different targets’ voltages (i.e., 1.8, 2.5, 3.3 and 5 Volts!). A

React to this headline:

Loading spinner

Bruschetta-Board: Multi-protocol Swiss Army knife for hardware hackers Read More »

Cambridge Bitcoin Electricity Consumption Index updated to reflect hardware distribution and hashrate increases

Cambridge Bitcoin Electricity Consumption Index updated to reflect hardware distribution and hashrate increases 31/08/2023 at 11:03 By Cointelegraph By Gareth Jenkinson Cambridge researchers revise the widely-cited index in response to evidence indicating periodic overestimation of Bitcoin mining’s electricity consumption. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

Cambridge Bitcoin Electricity Consumption Index updated to reflect hardware distribution and hashrate increases Read More »

U.S. Cyber Trust Mark labeling program raises the bar for smart devices’ cybersecurity

U.S. Cyber Trust Mark labeling program raises the bar for smart devices’ cybersecurity 19/07/2023 at 13:33 By Help Net Security The Biden-Harris Administration has announced a cybersecurity certification and labeling program to help Americans more easily choose smart devices that are safer and less vulnerable to cyberattacks. The new “U.S. Cyber Trust Mark” program proposed

React to this headline:

Loading spinner

U.S. Cyber Trust Mark labeling program raises the bar for smart devices’ cybersecurity Read More »

Optimized by Optimole
Scroll to Top