hardware

Compromising Linux virtual machines via FFS Rowhammer attack
A group of Dutch researchers have demonstrated a variant of the Rowhammer attack that can be used to successfully compromise Linux virtual machines on cloud servers. The Flip …

New method for detecting hardware Trojans
Modern computer chips are made up of hundreds of millions – often billions – of transistors. Such complexity enables the smartphone in your back pocket to perform all manner …

It’s time to replace firewalls in industrial network environments
Waterfall Security Solutions announced the expansion of its stronger-than-firewall solution portfolio for industrial control systems and critical infrastructure sites. …

Utilizing hardware to stop attackers earlier and without disruption
Too often the defense community makes the mistake of focusing on the “what,” without considering and truly understanding the “why.” This mindset often leads to the development …

Osram’s intelligent home lighting system is riddled with flaws
“Intelligent” home lighting system Osram Lightify sports a number of security vulnerabilities, some of which could lead to compromise of the product and the …

Low-cost wireless keyboards open to keystroke sniffing and injection attacks
Bastille Networks researcher Marc Newlin has discovered a set of security vulnerabilities in low-cost wireless keyboards that could be exploited to collect all passwords, …

50+ vulnerabilities found in popular home gateway modems/routers
Researcher Gergely Eberhardt with Hungarian security testing outfit SEARCH Laboratory has unearthed over fifty vulnerabilities in five home gateway modems/routers used by …

Snowden wants you to know when your phone is revealing your location
NSA whistleblower Edward Snowden and hardware hacker Andrew “Bunnie” Huang have possibly come up with a solution for warning users when their phones are revealing their …

Open source hardware cryptographic module offered for $800
For a few years now, the CrypTech project has been working on designing an open source hardware cryptographic engine that could be used to secure core Internet infrastructure. …

Review: iStorage diskAshur Pro
The iStorage diskAshur Pro is a hard drive for users with security on their mind. This USB 3.0 device comes in various storage capacities, ranging from 500GB to 2TB, and is …

Fiat Chrysler Automobiles launches bug bounty program
The convergence of connectivity technology and the automotive industry is creating a more enjoyable driving experience. Features such as self-diagnostics, keyless entry and …

Review: GuardKey
Over the years, we’ve covered many encrypted USB dongles on Help Net Security. All of them provide high security for your data, encrypted and stored on the dongle …