hardware
Scientists uncover vulnerability in FPGAs, affecting cloud services and IoT
Field-programmable gate arrays (FPGAs) are, so to say, a computer manufacturer’s “Lego bricks”: electronic components that can be employed in a more flexible …
How likely are weaponized cars?
It is easy to become absorbed by the exaggerated Hollywood depictions of car hacking scenarios – to imagine a not-so-distant future when cars or their supporting …
Siemens LOGO!, a PLC for small automation projects, open to attack
LOGO!, a programmable logic controller (PLC) manufactured by Siemens, sports three vulnerabilities that could allow remote attackers to reconfigure the device, access project …
Researchers fight ransomware attacks by leveraging properties of flash-based storage
Ransomware continues to pose a serious threat to organizations of all sizes. In a new paper, “Project Almanac: A Time-Traveling Solid State Drive,” University of …
IoT cyberattacks are the new normal, the security mindset isn’t
Eight in ten organizations have experienced a cyberattack on their IoT devices in the past 12 months, according to new research by Irdeto. Of those organizations, 90% …
Enterprises: Analyze your IoT footprint to address security, privacy concerns
The Zscaler ThreatLabZ research team analyzed 56 million IoT device transactions to understand the types of devices in use, the protocols used, the locations of the servers …
Google offers free replacement for buggy Titan Security Keys
Misconfigured Bluetooth pairing protocols in Google’s Titan Security Keys may allow attackers to communicate with users’ security key or with the device their key …
Employees are aware of USB drive security risks, but don’t follow best practices
Employees are aware of the risks associated with inadequate USB drive security – yet their employers aren’t mandating following best practices, according to a report by …
High-risk vulnerability in Cisco’s secure boot process impacts millions of devices
Red Balloon Security has discovered a high-risk vulnerability in Cisco’s secure boot process which impacts a wide range of Cisco products in use among enterprise and …
AI-optimized chipsets entering a new era as they become more specialized
The rapid adoption of artificial intelligence (AI) for practical business applications has introduced a number of uncertainties and risk factors across virtually every …
Securing satellites: The new space race
A decade ago, it would have cost you a billion dollars to deploy a satellite into space. Fast forward ten years and you can now have your own personal satellite floating in …
Unhackable? New chip makes the computer an unsolvable puzzle
A new computer processor architecture that could usher in a future where computers proactively defend against threats, rendering the current electronic security model of bugs …