#hardware-security

[ follow ]
Information security
fromZDNET
6 days ago

Why Windows 11 requires a TPM - and how you can get around it

A TPM is a secure cryptoprocessor that stores keys and performs cryptographic operations to enable features like Secure Boot, BitLocker, and Windows Hello.
fromsfist.com
2 weeks ago

Some Optical Gaming Mice Can Be Manipulated to Spy on Users Through AI, Researchers Warn

Researchers at UC Irvine uncovered a vulnerability that enables some gaming mice with polling rates of 4,000 Hz or higher many of which are developed in the Bay Area to be turned into spyware, capturing conversations through desk vibrations using AI. As Tom's Hardware reports, security researchers from the University of California Irvine found a way to use high-end optical gaming mice containing advanced sensors that can sample data up to 8,000 times per second, per Hoodline, to record users' conversations via desk vibrations.
Information security
Information security
fromTheregister
1 month ago

Ruh-roh. DDR5 memory vulnerable to new Rowhammer attack

A Rowhammer variant called Phoenix can corrupt and expose data on SK Hynix DDR5 modules, bypassing current protections and posing practical security risks.
Gadgets
fromZDNET
1 month ago

10 pocket-sized tools that make life easier - and how I use each

A compact, customized keychain can store essential everyday tools and security devices, keeping them accessible without carrying a full toolbox.
fromTheregister
1 month ago

Microsoft shows off custom silicon keeping Azure on lockdown

A key aspect of Microsoft's hardware security is isolation. Encryption keys are stored in an integrated hardware security module (HSM), while VMs are isolated from one another using trusted execution environments (TEE) baked into modern CPUs and GPUs. The control, data, networking, and storage planes are all offloaded to smartNICs and an open source Root of Trust (RoT) module ensures everything is what it purports to be.
Information security
[ Load more ]