
SLAP and FLOP: Complex vulnerabilities in Apple CPUs
New research demonstrates for the first time how hardware vulnerabilities in modern CPUs can be exploited in practice.
4 articles
New research demonstrates for the first time how hardware vulnerabilities in modern CPUs can be exploited in practice.
A Chaos Communication Congress speaker reflects on whether using open-source hardware can solve trust problems in hardware.
Trojanized HID devices as well as surveilling or malicious cables are serious threats that can be used to compromise even air-gapped systems.
Meltdown and Spectre: the two vulnerabilities that threaten every device on Intel, AMD or ARM processors
ACCEPT AND CLOSE
Notifications