Researchers have discovered a vulnerability in computer mice that allows attackers to eavesdrop on conversations by exploiting the way these devices communicate with computers. The technique, dubbed the "mic-e-mouse attack," highlights potential security risks associated with everyday peripherals, raising concerns about privacy and data protection.
Researchers from ETH Zurich and Google have developed a new Rowhammer attack variant named Phoenix, which successfully bypasses DDR5 memory chip protections, allowing attackers to flip bits and escalate privileges. Despite defenses like Target Row Refresh (TRR), the attack exploits specific refresh intervals, demonstrating vulnerabilities across all tested DDR5 memory modules. The findings highlight a critical security risk affecting DIMM RAM produced from 2021 to 2024, with practical implications for data integrity and system security.