
Zenbleed: new hardware vulnerability in AMD CPUs
Explaining an issue in popular PC and server CPUs in simple terms.
47 articles
Explaining an issue in popular PC and server CPUs in simple terms.
Researchers have come up with a way to exfiltrate confidential data by observing LED activity.
A brief, plain-language explanation of an advanced method of data theft using features of modern CPUs.
Image-generating neural networks are already everywhere. What privacy risks do they pose?
Better put them on something not very valuable or necessary. Here we explain why.
A method of stealing data from an air-gapped system through a speaker you may not even know is there.
One of the most curious and menacing bugs in Android smartphones, and the problems they had closing it.
In late 2022, Apple announced a raft of new data protection features. Why does that matter to users?
Stealing data from an isolated network by manipulating the voltage switching converter.
Researchers find a new reliable way to track the location of wireless Wi-Fi devices.
Home video surveillance systems are said to be safe. But are you ready to become a reality TV star without realizing it?
We investigate the connection between software security and leaks when handling RAM.
An interesting bug in one of the most popular embedded DBMS.
Seriously, don’t do it. A Kaspersky study of malware spreading in China shows why it’s always a bad idea.
How a vector graphics editor helped create one of the internet’s most important technologies, and why it led to huge security risks.
The top-4 technologies in use today that long belong in a museum.
The developers of a run-of-the-mill Python module recently found out why old unpatched vulnerabilities can be dangerous.
An unusual case of an attack executed by weaponizing legit video game code.
Takeaway from DEF CON 30: vulnerability in Zoom for macOS.