Tag: Hardware
-
Check Point warnt vor gefährlicher Malware Raspberry Robin
Die kontinuierlichen Verbesserungen der Malware führen zu neuen Funktionen und Umgehungsmechanismen, die darauf abzielen, von der Sicherheitsabwehr un… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/check-point-warnt-vor-gefaehrlicher-malware-raspberry-robin/a36455/
-
Raspberry Robin Evolves With Stealth Tactics, New Exploits
First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/raspberry-robin-stealth-tactics/
-
ISAs and the Dawning Hardware Security Revolution
Tags: HardwareFirst seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/isa-dawning-hardware-security-revolution
-
[Video] CCCAMP 2015 – Hardware attacks: hacking chips on the (very) cheap
Hardware attacks: hacking chips on the (very) cheapHow to retrieve secret keys without going bankruptHardware attacks are becoming more and more commo… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/ja1QciUBkEc/13938
-
[Video] CCCAMP 2015 – The rad1o – Listen to all the things
The rad1oListen to all the thingsWe will give a introduction on what your badge can do. An overview of the hardware details and software options as we… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/KQFJbny_zpY/13909
-
[Video] Bsides Las Vegas 2015 – Serial Box – Primer for dealing with Serial and JTAG for basic hardware hacking
Matthew JakubowskiWhile serial interfaces and tools to easily make use of them are more widespread than ever. However, with the downfall of the serial… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/bUopfC6AsBQ/13888
-
DARPA to Hunt for Malicious Functions in Hardware and Software
First seen on http: Jump to article: t.co/pQEDZYc2
-
[News] DARPA Looks For Backdoors, Malware In Tech Products
Does commercial, off-the-shelf software or hardware contain built-in backdoors to give foreign attackers direct access to corporate or government netw… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/zZBpe1uSb7I/1108
-
Raspberry Pi hacking event sees Spooks team crowned winners: Team Spooks have been crowned winners of a 24-hou…
First seen on http: Jump to article: bit.ly/11QfhDF
-
Schwachstelle in Samsung-Druckern verschafft Administratorrechte
Es handelt sich um ein in der Hardware definiertes SNMP-Konto. Angreifer können damit aus der Ferne jegliche Daten abfangen oder auf dem Drucker Code … First seen on http: Jump to article: www.zdnet.de/88133793/schwachstelle-in-samsung-druckern-verschafft-administratorrrechte/
-
Hardware based malware steals contacts from all mobile platforms using only the Audio Jack!
Indian Security Research Atul Alex presented his surprise paper at the International Malware Conference, MalC… First seen on http: Jump to article: http://thehackernews.com/2012/11/hardware-based-malware-steals-contacts.html
-
HP: Wir haben keine Spionage-Software an Syrien verkauft
Hewlett-Packard hat Anschuldigungen zurückgewiesen, wonach es Hardware zum Aufbau eines Überwachungssystems an die syrische Regierung geliefert haben … First seen on http: Jump to article: www.silicon.de/41576241/hp-wir-haben-keine-spionage-software-an-syrien-verkauft/
-
[Video] Build Free Hardware In Geda
Tags: HardwareFirst seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/O8SnM0G-OoI/6271
-
Raspberry Pi Hacking Competition Set for December
Electronics distributor CPC is inviting entries for the first ever Raspberry Pi ‘hackathon’, a competition to see which individual or tea… First seen on http: Jump to article: www.computerworld.in/news/raspberry-pi-hacking-competition-set-december-42282012
-
Raspberry Pi hacking competition set for December: Electronics distributor CPC is inviting entries for the first…
First seen on http: Jump to article: bit.ly/Uo9u3S
-
[Video] The Darknet of Things, Building Sensor Networks That Do Your Bidding
The Internet of Things… It is coming, wearing hardware that communicates across the Internet is starting to become a reality, chips are getting smal… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/3SfTwJ0Q0pc/6217
-
Dell software chief: why hardware is no longer enough: Dell launched its software group at the beginning of 2012…
First seen on http: Jump to article: bit.ly/XwwnIi
-
CPC To Run 24-Hour Raspberry Pi Hackathon
Tags: HardwareFirst seen on http: Jump to article: packetstormsecurity.org/news/view/21780/CPC-To-Run-24-Hour-Raspberry-Pi-Hackathon.html
-
[Video] Hardware Backdooring is Practical
This presentation will demonstrate that permanent backdooring of hardware is practical. We have built a generic proof of concept malware for the intel… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/DtIIDpRhEPU/6207
-
Ignore Supply Chain Security and Risk Management at Your Peril
No CFO thinks that his signature approving a purchase order for a new five-figure piece of hardware could ultimately cost his company seven-figures, o… First seen on http: Jump to article: threatpost.com/en_us/blogs/dan-guido-threads-mobile-security-conference-111212
-
New IronKey hardware-encrypted secure flash drives
Tags: HardwareFirst seen on http: Jump to article: net-security.org/secworld.php
-
Handy-Hardware: Spekulationen über Microsoft-Smartphone …
First seen on http: Jump to article: spon.de/adNbO
-
Ein Rasperry Pi (Modell B)
Für 30 Euro gibt es den Mini-Computer Raspberry Pi zu kaufen. Das Projekt ist ein Erfolg. Erstmals kommen auch die Hardware-Hersteller der Bastlerszen… First seen on http: Jump to article: www.zeit.de/digital/2012-10/raspberry-pi-open-source-computer
-
TPM Chip in Windows 8 Lays Foundation for Widespread Enhancements to Hardware-Based Security
Today’s release of the Microsoft Windows 8 operating system brings embedded hardware-level security to the forefront. Microsoft, going forward, will r… First seen on http: Jump to article: threatpost.com/en_us/blogs/ip-theft-supply-chain-security-major-worries-government-former-cybersecurity-czar-says-102612
-
Transparenzinitiative: Huawei stellt Australien seinen kompletten Quelltext zur Verfügung
Tags: HardwareAuch seine Hardware will es offenlegen und so Sicherheitsbedenken entkräften. Der Geschäftsführer von Huawei Australien gibt sich selbst die Schuld fü… First seen on http: Jump to article: www.zdnet.de/88128546/transparenzinitiative-huawei-stellt-australien-seinen-kompletten-quelltext-zur-verfugung/
-
HackRF Jawbreaker Could Bring Low-Cost Wireless Hacking to the Masses
Generations of hobbyists hardware hackers have spent countless hours messing with piles of radio gear, happily tinkering away in garages and basements… First seen on http: Jump to article: threatpost.com/en_us/blogs/report-service-offers-cheap-access-fortune-500-servers-102212
-
Getting Started With The Raspberry Pi Is Not As Easy As Pie: The super low cost computer called the Raspberry Pi…
First seen on http: Jump to article: bit.ly/UpDP5u
-
Hardware-Bastler: Roboter bauen und die Welt verstehen…
Tags: HardwareFirst seen on http: Jump to article: spon.de/adMma
-
Thales releases elliptic curve hardware security modules
Tags: HardwareFirst seen on http: Jump to article: net-security.org/secworld.php
-
[Video] DerbyCon 2012 – The Glitch: Hardware With Hacking Made Easy
There are many great “Do It Yourself†security testing hardware projectsout there. The problem for most people is the time and expertise i… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/8vQtyhJw7pY/5931

