Hardware

Busting the Myths of Hardware Based Security

Many experts often overlook hardware based security and its vital importance in establishing a secure workspace. When it comes to…

2 years ago

SEC Xtractor – Experts released an open-source hardware analysis tool

Security and consulting company SEC Consult announced the release of an open-source hardware analysis tool dubbed SEC Xtractor Security firm…

4 years ago

Popular hacking toolkit Metasploit adds hardware testing capabilities

The Metasploit hacking toolkit now includes a new hardware bridge that makes it easier for users to analyze hardware devices.…

7 years ago

Fabrication-time Attacks and the Manchurian Chip

Boffins released a paper describing how computer processors can be programmed to give elevated privileges to hackers and run fabrication-time…

8 years ago

Rakshasa, is it possible design the perfect hardware backdoor?

Every day we read about new powerful variants of malware of increasing complexity, they are used in fraud schemas by…

12 years ago

Hardware qualification, a must in a cyber strategy

We live in the era of free technology market , devices and appliances of all kinds can be found on…

12 years ago

This website uses cookies.