Skip to main content

Home/ ITGSonline/ Group items tagged hardware

Rss Feed Group items tagged

dr tech

T2 security chip on Macs can be hacked to plant malware - 9to5Mac - 0 views

  •  
    "TL;DR: all recent macOS devices are no longer safe to use if left alone, even if you have them powered down. The root of trust on macOS is inherently broken They can bruteforce your FileVault2 volume password They can alter your macOS installation They can load arbitrary kernel extensions"
dr tech

The Fresh Smell of ransomed coffee - Avast Threat Labs - 0 views

  •  
    "Let's say you have an IoT device that is well protected with functions that can be accessed through a well-defined API; even if you can control the device through the API, you probably can't do too much harm. Firmware, the programming inside the device has logical constraints that don't allow you, for example, to close garage doors while someone is in the way of them or overheat a device so that it combusts.  We used to trust that hardware, such as a common kitchen appliance, could be trusted and could not be easily altered without physically dismounting the device. But with today's "smart" appliances, this is no longer the case."
dr tech

U.K. Found 'Critical' Weakness in Huawei Equipment - Bloomberg - 0 views

  •  
    ""Critical, user-facing vulnerabilities" were found in the Chinese supplier's fixed-broadband products caused by poor code quality and an old operating system, the Huawei Cyber Security Evaluation Centre Oversight Board said in a report. "U.K. operators needed to take extraordinary action to mitigate the risk.""
dr tech

Pen Test Partners: Boeing 747s receive critical software updates over 3.5" floppy disks... - 0 views

  •  
    ""This database has to be updated every 28 days, so you can see how much of a chore this has to be for an engineer to visit," Lomas said, pointing out the floppy drive - which in normal operations is tucked away behind a locked panel."
dr tech

The Downfall of Computers - David Koff - Medium - 0 views

  •  
    "These exploits are based on chip engineering flaws, not on software flaws. Apple, Google, Abode, Microsoft, and other software companies didn't write poor software or bad Operating Systems to cause these problems to occur. Rather, the chip manufacturers - Intel, AMD and ARM - designed and then engineered computer chips with flaws built into them. Once discovered, those flaws allow the Meltdown and Spectre exploits to be run. Worse, these chips have been sold with consumer computers, servers and mobile devices since 1995. so the impact is, potentially, both personal and global in scope."
dr tech

Moore's Law is dying. Here's how AI is bringing it back to life! - 0 views

  •  
    "The turning point happened in 2005, when the transistors, while continuing to double in numbers, were neither faster nor more energy-efficient at the same rates as before."
dr tech

What is HTTP/2 and is it going to speed up the web? | Technology | The Guardian - 0 views

  •  
    "HTTP/2 is a more modern protocol that essentially speeds web browsing up using new ways of transporting data between the browser and server across the internet. It is backwards compatible with HTTP1.1 and uses most of the same technologies, but it is more efficient and allows servers to respond with more content than was originally requested, removing the need for the user's computer to continually send requests for more information until a website is fully loaded."
1 - 11 of 11
Showing 20 items per page