searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

chip

Get our top stories in your inbox

Samsung, Vivo, Google phones open to remote compromise without user interaction

March 17, 2023

Several vulnerabilities in Samsung’s Exynos chipsets may allow attackers to remotely compromise specific Samsung Galaxy, Vivo and Google Pixel mobile phones with no user …

Dissecting Google’s Titan M chip: Vulnerability research challenges

August 9, 2022

The enterprise-grade Titan M security chip was custom built to help protect data. Derived from the same chip Google uses to protect its cloud data centers, it handles …

Increased connectivity: What’s in store for 2022?

December 6, 2021

Deloitte released a report which highlights how trends in Technology, Media & Telecommunications (TMT) may affect businesses and consumers worldwide in 2022. The report …

Intel chip flaw could enable attacks on laptops, cars, medical devices (CVE-2021-0146)

November 15, 2021

Researchers uncovered a vulnerability in Intel Processors that could affect laptops, cars and embedded systems. The flaw (CVE-2021-0146) enables testing or debugging modes on …

Engineers design transistor that disguises key computer chip hardware from hackers

December 11, 2020

A hacker can reproduce a circuit on a chip by discovering what key transistors are doing in a circuit – but not if the transistor “type” is undetectable. Purdue University …

Researchers break Intel SGX by creating $30 device to control CPU voltage

November 16, 2020

Researchers at the University of Birmingham have managed to break Intel SGX, a set of security functions used by Intel processors, by creating a $30 device to control CPU …

New side-channel attacks allow access to sensitive data on Intel CPUs

November 10, 2020

An international team of security researchers is presenting new side-channel attacks (CVE-2020-8694 and CVE-2020-8695), which use fluctuations in software power consumption to …

Starbleed vulnerability: Attackers can gain control over FPGAs

April 20, 2020

Field Programmable Gate Arrays, FPGAs for short, are flexibly programmable computer chips that are considered very secure components in many applications. Starbleed …

Researchers develop self-healing and self-concealing PUF for hardware security

April 17, 2020

A team of researchers from the National University of Singapore (NUS) has developed a novel technique that allows Physically Unclonable Functions (PUFs) to produce more …

Most computers easy to hack due to vulnerability in memory chips

March 13, 2020

Most computer systems are still very easy to hack, due to a vulnerability in memory chips produced by Samsung, Micron and Hynix, according to a study by researchers from VUSec …

Tiny cryptographic ID chip can help combat hardware counterfeiting

February 28, 2020

To combat supply chain counterfeiting, which can cost companies billions of dollars annually, MIT researchers have invented a cryptographic ID tag that’s small enough to …

Flaw affecting 1B+ Wi-Fi-enabled devices allows attackers to decrypt wireless network packets

February 27, 2020

ESET researchers have discovered Kr00k (CVE-2019-15126), a previously unknown vulnerability in Wi-Fi chips used in many client devices, Wi-Fi access points and routers. Kr00k …

Posts navigation

1 2

Featured news

  • 2022 witnessed a drop in exploited zero-days
  • Ferrari data breach: Client data exposed
  • 5 rules to make security user-friendly
How to protect online privacy in the age of pixel trackers

Sponsored

Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice

Security in the cloud with more automation

CISOs struggle with stress and limited resources

How to scale cybersecurity for your business

Don't miss

2022 witnessed a drop in exploited zero-days

5 rules to make security user-friendly

The impact of AI on the future of ID verification

How to protect online privacy in the age of pixel trackers

Detecting face morphing: A simple guide to countering complex identity fraud

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us