Please turn on your JavaScript for this page to function normally.
CWE list now includes hardware security weaknesses

The Mitre Corporation has released version 4.0 of the Common Weakness Enumeration (CWE) list, which has been expanded to include hardware security weaknesses. About CWE The …

binary
Mixed-signal circuits can stop side-channel attacks against IoT devices

Purdue University innovators have unveiled technology that is 100 times more resilient to electromagnetic and power attacks, to stop side-channel attacks against IoT devices. …

Healthcare IoT
The challenges of cyber research and vulnerability disclosure for connected healthcare devices

As Head of Research at CyberMDX, Elad Luz gathers and analyzes information on a variety of connected healthcare devices in order to improve the techniques used to protect them …

spreadsheet
43% of IT professionals are still tracking assets in spreadsheets

43% of IT professionals report using spreadsheets as one of their resources for tracking assets, according to Ivanti. Further, 56% currently do not manage the entire asset …

5G
In 2020, 5G deployments will continue at a frantic pace

The implementation of massive MIMO in 5G systems is changing, according to a Mobile Experts report. There’s a shift away from the dominant position of 64T64R mMIMO, …

AutomationDirect C-more Touch Panels
Touch panels deployed in critical infrastructure vulnerable to remote attacks

Manufacturing facilities and processing centers using AutomationDirect C-more Touch Panels are advised to upgrade their firmware ASAP, as older versions contain a high-risk …

USB armory
USB armory Mk II: A secure computer on a USB stick featuring open source hardware design

The hardware security professionals at F-Secure have created a new version of the USB armory – a computer on a USB stick built from the ground up to be secure. USB armory Mk …

NIST JTAG
Scientists test forensic methods to acquire data from damaged mobile phones

Criminals sometimes damage their mobile phones in an attempt to destroy data. They might smash, shoot, submerge or cook their phones, but forensics experts can often retrieve …

Scooter
Security risks for e-scooters and riders exposed

Micromobility vehicles, such as e-scooters, zip in and out of traffic. For this reason, micromobility is seen as an alleviating trend to help tackle traffic congestion. …

GE Carescape
MDhex vulnerabilities open GE Healthcare patient monitoring devices to attackers

Researchers have discovered six critical and high-risk vulnerabilities – collectively dubbed MDhex – affecting a number of patient monitoring devices manufactured …

network
A case for establishing a common weakness enumeration for hardware security

As modern computer systems become more complex and interconnected, we are seeing more vulnerabilities than ever before. As attacks become more pervasive and sophisticated, …

IoT
California’s IoT cybersecurity bill: What it gets right and wrong

California state lawmakers should be lauded for SB 327, their well-intentioned legislative attempt at tackling one of the most pressing issues in the tech sector: IoT …

Don't miss

Cybersecurity news