hardware
![If It's Smart, It's Vulnerable book](https://img.helpnetsecurity.com/wp-content/uploads/2022/07/29082305/mikko-book-smart-vulnerable-400x200.jpg)
Introducing the book: If It’s Smart, It’s Vulnerable
All our devices and gadgets are going online, just like our computers did. But once we’ve successfully connected our devices to the internet, do we have any hope of keeping …
![chip](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094400/chip1-400x200.jpg)
The first formal verification of a prototype of Arm CCA firmware
As our personal data is increasingly used in many applications from advertising to finance to healthcare, protecting sensitive information has become an essential feature for …
![chip](https://img.helpnetsecurity.com/wp-content/uploads/2018/12/09095522/chip-400x200.jpg)
Destructive firmware attacks pose a significant threat to businesses
As business workforces become increasingly distributed, IT leaders say it’s harder than ever to defend against firmware attacks, according to HP Wolf Security. The growing …
![router](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100046/router-400x200.jpg)
Researchers uncover ZuoRAT malware targeting home-office routers
Black Lotus Labs discovered a new remote access trojan (RAT) called ZuoRAT, which targets remote workers via their small office/home office (SOHO) devices, including models …
![OT ICEFALL](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/17120355/ot_icefall-hns-400x200.jpg)
Researchers disclose 56 vulnerabilities impacting thousands of OT devices
Forescout’s Vedere Labs disclosed OT:ICEFALL, 56 vulnerabilities affecting devices from 10 operational technology (OT) vendors. This is one of the single largest …
![](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/27122245/hardware3-400x200.jpg)
Threats to hardware security are growing
Hardware attacks are becoming more and more sophisticated. There are several reasons this could be happening: Security increasingly supported in hardware – Mistakes can …
![power](https://img.helpnetsecurity.com/wp-content/uploads/2022/04/12070300/power-400x200.jpg)
Potential threats to uninterruptible power supply (UPS) devices
In this video for Help Net Security, Chris Westphal, Cybersecurity Evangelist at Ordr, talks about an alert that came out recently from CISA and the Department of Energy …
![hardware security](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/26095514/hardware-security-tools-400x200.jpg)
Hardware security modules market to reach $7.9 billion by 2028
The global hardware security modules market size was valued at $3.1 billion in 2020 and is projected to reach $7.9 billion by 2028, growing at a CAGR of 12.4% from 2021 to …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092911/money-400x200.jpg)
Spending on edge computing to reach $176 billion in 2022
Worldwide spending on edge computing is expected to be $176 billion in 2022, an increase of 14.8% over 2021. Enterprise and service provider spending on hardware, software, …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093354/mac-laptop-400x200.jpg)
The security of devices held by public sector employees
Apricorn announced new findings from Freedom of Information (FoI) requests submitted to 16 government departments into the security of devices held by public sector employees. …
![chip](https://img.helpnetsecurity.com/wp-content/uploads/2018/12/09095522/chip-400x200.jpg)
Intel chip flaw could enable attacks on laptops, cars, medical devices (CVE-2021-0146)
Researchers uncovered a vulnerability in Intel Processors that could affect laptops, cars and embedded systems. The flaw (CVE-2021-0146) enables testing or debugging modes on …
![code](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/17125255/code-chip-400x200.jpg)
Strengthening firmware security with hardware RoT
Hackers are growing smarter and more sophisticated in their attempts to avoid detection. With IT security and visibility efforts still largely focused higher in the stack at …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD