Failure to sign firmware updates put Windows and Linux devices at risk February 20, 2020 Hugh Taylor Off Cyber Policy in the News, Hardware Security, Failure to sign firmware updates put Windows and Linux devices at risk To access this...
63% of organizations face #security #breaches due to hardware vulnerabilities – LogRhythm on Twitter December 22, 2019 Hugh Taylor Off Cyber Security Research, Hardware Security, #Hardware-level breaches are one of the latest modes of attack by cybercriminals, according to a...
Report: Nearly 40% of Security Cameras May Be Vulnerable to Cyber-Attacks December 10, 2019 Hugh Taylor Off Cyber Security Research, Hardware Security, Report: Nearly 40% of Security Cameras May Be Vulnerable to Cyber-Attacks New research from Genetec...
Would you notice if your calculator was lying to you? The research says probably not November 1, 2019 Hugh Taylor Off Cyber Security Research, Hardware Security, Would you notice if your calculator was lying to you? The research says probably not...
IoT Update: NIST Seeks Public Comment on Security Review of Smart Home IoT Devices | Lexology October 30, 2019 Hugh Taylor Off Hardware Security, Industry News, IoT Update: NIST Seeks Public Comment on Security Review of Smart Home IoT Devices |...
Planting Tiny Spy Chips in Hardware Can Cost as Little as $200 October 11, 2019 Hugh Taylor Off Cyber Policy in the News, Hardware Security, Planting Tiny Spy Chips in Hardware Can Cost as Little as $200 Planting Tiny Spy...
Hackers Can Slip Invisible Malware into Some Cloud Computers February 27, 2019 Hugh Taylor Off Cyber Policy in the News, Hardware Security, Hackers Can Slip Invisible Malware into Some Cloud Computers Hackers Can Slip Invisible Malware into...
There Is No Good Way to Stop China From Planting Microchips in American Electronics October 4, 2018 Hugh Taylor Off Cyber Policy in the News, Hardware Security, There Is No Good Way to Stop China From Planting Microchips in American Electronics There...
China reportedly infiltrated Apple and other US companies using ‘spy’ chips on servers October 4, 2018 Hugh Taylor Off Cyber Policy in the News, Hardware Security, China reportedly infiltrated Apple and other US companies using ‘spy’ chips on servers China reportedly...
IIOT Security Challenge: Building a Policy Enforcement Architecture June 8, 2018 Hugh Taylor Off Featured, Hardware Security, Business and government leaders are only now starting to come to grips with the cyber...