
SLAP and FLOP: Complex vulnerabilities in Apple CPUs
New research demonstrates for the first time how hardware vulnerabilities in modern CPUs can be exploited in practice.
7 articles
New research demonstrates for the first time how hardware vulnerabilities in modern CPUs can be exploited in practice.
A Chaos Communication Congress speaker reflects on whether using open-source hardware can solve trust problems in hardware.
Trojanized HID devices as well as surveilling or malicious cables are serious threats that can be used to compromise even air-gapped systems.
Meltdown and Spectre: the two vulnerabilities that threaten every device on Intel, AMD or ARM processors
With accessible network cables and a lack of authentication between the ATM and the bank’s infrastructure, ATMs are far too easy to attack.
Any USB device can potentially be zombified and turned into a secret agent for cybercrooks. The world needed a shield against this threat, so we rolled up our sleeves and created one.
A virus damaging hardware is one of the most widely believed myths in the infosec domain. And, at the same time, it’s the most non-standard one. And it’s not totally a myth, after all.