Click any tag below to further narrow down your results
Links
A new attack called TEE.fail compromises the security of Trusted Execution Environments (TEEs) from Nvidia, AMD, and Intel. It utilizes a simple hardware method that, once executed, renders these TEEs untrustworthy, even if the operating system kernel is compromised. This raises significant concerns about the security claims made by chipmakers regarding their TEEs.
The article discusses the rapid growth of C++ and Rust from 2022 to 2025, attributing it to the increasing demand for efficient programming languages driven by limitations in hardware capabilities and power supply. It also addresses misconceptions about C++'s safety and security, highlighting improvements in the upcoming C++26 standard.
Shift uses tamper-resistant hardware to securely manage private keys and transaction states, ensuring that digital value moves freely between devices without reliance on software. It incorporates remote attestation to verify the legitimacy of transactions and prevent fraud.
CatSniffer is a versatile multiprotocol board designed for sniffing, communicating, and attacking IoT devices, featuring support for technologies like LoRa, Sub 1 GHz, and 2.4 GHz. It is a developer-friendly tool that integrates with various software options, allowing users to create custom applications for IoT security research. The project is open-source, with continuous support and updates for multiple board versions.
DARKNAVY conducted a thorough analysis of the Starlink user terminal antenna, revealing insights into its hardware and firmware structure, including its security features and potential vulnerabilities. The investigation highlighted the use of a dedicated security chip and the presence of a program that may capture network packets, although it appears to focus on satellite telemetry rather than user privacy. As satellite technology develops, understanding these components becomes crucial for both security and operational integrity.