Can your mouse eavesdrop on you?
The optical sensors in computer mice can be used for eavesdropping. We break down why this is fascinating — but still a long way from real-world practicality.
6 articles
The optical sensors in computer mice can be used for eavesdropping. We break down why this is fascinating — but still a long way from real-world practicality.
Phoenix, a new variant of the Rowhammer attack, makes it possible to attack DDR5 memory modules.
New research demonstrates for the first time how hardware vulnerabilities in modern CPUs can be exploited in practice.
A Chaos Communication Congress speaker reflects on whether using open-source hardware can solve trust problems in hardware.
Trojanized HID devices as well as surveilling or malicious cables are serious threats that can be used to compromise even air-gapped systems.
Meltdown and Spectre: the two vulnerabilities that threaten every device on Intel, AMD or ARM processors