#hardware-security

[ follow ]
Information security
fromZero Day Initiative
5 days ago

Zero Day Initiative - Pwn2Own Automotive 2026 - Day Two Results

Julien Cohen-Scali chained an authentication bypass and privilege escalation on Phoenix Contact CHARX SEC-3150, earning $20,000 and 4 Master of Pwn points; Autocrypt failed to demonstrate a Grizzl‑E exploit in time.
#everyday-carry
fromZDNET
5 days ago
Gadgets

10 tiny gadgets I carry with me everywhere - and you might want to, too

fromZDNET
5 days ago
Gadgets

10 tiny gadgets I carry with me everywhere - and you might want to, too

fromFortune
1 week ago

I oversee a lab where engineers try to destroy my life's work. It's the only way to prepare for quantum threats | Fortune

This happened in the early 1990s, when I was a young engineer starting an internship at one of the companies that helped create the smart card industry. I believed my card was secure. I believed the system worked. But watching strangers casually extract something that was supposed to be secret and protected was a shock. It was also the moment I realized how insecure security actually is, and the devastating impact security breaches could have on individuals, global enterprises, and governments.
Information security
Information security
fromZero Day Initiative
2 weeks ago

Zero Day Initiative - The Alpitronic HYC50 Hardware Teardown for Pwn2Own Automotive 2026

Alpitronic HYC50 is a well-documented, mature EV charger with exploitable physical debug and manufacturing interfaces and custom development units requiring hardware inspection before power-up.
Poker
fromWIRED
2 months ago

How to Hack a Poker Game

Automatic card shufflers like the Deckmate 2 can be manipulated to rig games, revealing broader supply-chain and device vulnerabilities.
Information security
fromZDNET
3 months ago

Why Windows 11 requires a TPM - and how you can get around it

A TPM is a secure cryptoprocessor that stores keys and performs cryptographic operations to enable features like Secure Boot, BitLocker, and Windows Hello.
fromsfist.com
3 months ago

Some Optical Gaming Mice Can Be Manipulated to Spy on Users Through AI, Researchers Warn

Researchers at UC Irvine uncovered a vulnerability that enables some gaming mice with polling rates of 4,000 Hz or higher many of which are developed in the Bay Area to be turned into spyware, capturing conversations through desk vibrations using AI. As Tom's Hardware reports, security researchers from the University of California Irvine found a way to use high-end optical gaming mice containing advanced sensors that can sample data up to 8,000 times per second, per Hoodline, to record users' conversations via desk vibrations.
Information security
Information security
fromTheregister
4 months ago

Ruh-roh. DDR5 memory vulnerable to new Rowhammer attack

A Rowhammer variant called Phoenix can corrupt and expose data on SK Hynix DDR5 modules, bypassing current protections and posing practical security risks.
fromTheregister
5 months ago

Microsoft shows off custom silicon keeping Azure on lockdown

A key aspect of Microsoft's hardware security is isolation. Encryption keys are stored in an integrated hardware security module (HSM), while VMs are isolated from one another using trusted execution environments (TEE) baked into modern CPUs and GPUs. The control, data, networking, and storage planes are all offloaded to smartNICs and an open source Root of Trust (RoT) module ensures everything is what it purports to be.
Information security
[ Load more ]