hardware
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094938/ai1-400x200.jpg)
AI-optimized chipsets entering a new era as they become more specialized
The rapid adoption of artificial intelligence (AI) for practical business applications has introduced a number of uncertainties and risk factors across virtually every …
![satellite](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094351/satellite-400x200.jpg)
Securing satellites: The new space race
A decade ago, it would have cost you a billion dollars to deploy a satellite into space. Fast forward ten years and you can now have your own personal satellite floating in …
![chip](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094403/chip2-400x200.jpg)
Unhackable? New chip makes the computer an unsolvable puzzle
A new computer processor architecture that could usher in a future where computers proactively defend against threats, rendering the current electronic security model of bugs …
![Dell laptop](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094358/dell-laptop-400x200.jpg)
Flaw in pre-installed software opens Dell computers to remote hijack
Dell computer owners should update the Dell SupportAssist software as soon as possible to close a high-risk remote code execution vulnerability. What is Dell SupportAssist? …
![alert](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094437/alert-400x200.jpg)
Making the most of threat intelligence with threat intelligence gateways
Even though many security professionals are still dissatisfied with threat intelligence accuracy and quality, its use as a resource for network defense is growing. According …
![medical](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094451/medical-400x200.jpg)
Hacking our way into cybersecurity for medical devices
Hospitals are filled with machines connected to the internet. With a combination of both wired and wireless connectivity, knowing and managing which devices are connected has …
![HDD](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09100944/hdd-400x200.jpg)
A surprising number of used drives sold on eBay hold sensitive data
42% of used drives sold on eBay are holding sensitive data, with 15% containing personally identifiable information (PII), according to Blancco Technology Group. Conducted in …
![Qualcomm](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094501/qualcomm-400x200.jpg)
Qualcomm chips leak crypto data from secure execution environment
A vulnerability in Qualcomm chips could be exploited by attackers to retrieve encryption keys and sensitive information from the chipsets’ secure execution environment, …
![smartphone isolation](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101952/smartphone-isolation-400x200.jpg)
Employee cybersecurity essentials part 2: Lost devices and unsafe connections
Security is only as strong as its weakest link, and as we have seen, that includes your employees. Faulting workers for behavior they’ve become accustomed to in their private …
![Android smartphone](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094650/android-smartphone-400x200.jpg)
The surveillance economy has set its sights on smartphone sensors
The most successful companies of our time are those who’ve mastered user data – collecting it, analyzing it and profiting from it – typically at the expense of user privacy. …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110724/iot-400x200.jpg)
Regulating the IoT: Impact and new considerations for cybersecurity and new government regulations
In 2019 we have reached a new turning point in the adoption of IoT – more markets and industries are migrating to a cloud-based infrastructure, and as the IoT continues to …
![Biohacking Village](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094638/biohacking_village-400x200.jpg)
Hacking healthcare: A call for infosec researchers to probe biomedical devices
It is a brave new connected world out there and there is no shortage of cybersecurity risks associated with everything we do. We can’t even be sure that the technologies …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)