An unusual method of stealing data from surveillance cameras
We explain in simple terms research demonstrating a vulnerability in modern digital video cameras.
56 articles
We explain in simple terms research demonstrating a vulnerability in modern digital video cameras.
We review a recent research paper highlighting a major hardware vulnerability in Apple M1, M2, and M3 CPUs.
A recent study shows how it’s possible to identify typed text from the sound of keystrokes — even in far-from-ideal environments.
Researchers claim to have found a way to recover a fingerprint by… eavesdropping on a user swiping a finger across the screen!
A fresh study of some unexpected properties of a standard feature of all modern smartphones and tablets.
A serious vulnerability in UEFI firmware relevant to a large number of modern computers, and even servers.
How a recently discovered bug in Intel processors threatens cloud providers.
How and why did American researchers try to extract sound from a video signal, and was it worth it?
We look at a new sophisticated attack on AMD and Intel integrated graphics cards.
Explaining an issue in popular PC and server CPUs in simple terms.
Researchers have come up with a way to exfiltrate confidential data by observing LED activity.
A brief, plain-language explanation of an advanced method of data theft using features of modern CPUs.
Image-generating neural networks are already everywhere. What privacy risks do they pose?
Better put them on something not very valuable or necessary. Here we explain why.
A method of stealing data from an air-gapped system through a speaker you may not even know is there.
One of the most curious and menacing bugs in Android smartphones, and the problems they had closing it.
In late 2022, Apple announced a raft of new data protection features. Why does that matter to users?
Stealing data from an isolated network by manipulating the voltage switching converter.
Researchers find a new reliable way to track the location of wireless Wi-Fi devices.
Home video surveillance systems are said to be safe. But are you ready to become a reality TV star without realizing it?