HackDig : Dig high-quality web security articles for hackers

Intel adds hardware-based ransomware detection to 11th gen CPUs

Intel announced today at CES 2021 that they have added hardware-based ransomware detection to their newly announced 11th generation Core vPro business-class processors.These hardware-based detections are accomplished using Intel Threat Detection Technology (Intel TDT) and Hardware Shield that run directly on the CPU underneath the operating system and firmwa
Publish At:2021-01-12 02:13 | Read:134 | Comments:0 | Tags:Security Hardware ransomware

Windows 10 ARM runs faster on M1 Macs than on a Surface Pro X

Since Apple unveiled its M1 chip, users have been in awe of its performance power efficiency. It turns out that the M1 chip not only performs fantastic for macOS BigSur but it may also be a better choice for Windows 10 than Microsoft's own devices.Apple released its ARM-based M1 chip on November 17th for the Mac mini, MacBook Air, and MacBook Pro 13" and the
Publish At:2020-11-30 20:13 | Read:246 | Comments:0 | Tags:Microsoft Apple Hardware

Intel’s Ice Lake Xeon processors get new security features

Intel today revealed the data security and privacy upgrades that will be introduced to the upcoming 3rd generation Intel Xeon Scalable processors code-named Ice Lake and specifically built to power data center platforms."Intel is doubling down on its Security First Pledge, bringing its pioneering and proven Intel Software Guard Extension (Intel SGX) to the f
Publish At:2020-10-14 13:18 | Read:313 | Comments:0 | Tags:Hardware Software security

New Windows 10 update forcibly enables HP Battery Health Manager

Source: Norebbo.comMicrosoft has released an update for all supported versions of Windows 10 that forcefully enable the Battery Health Manager option in the BIOS of supported HP business laptops.HP Battery Health Manager is a BIOS battery management feature in specific HP business laptops that modifies how a battery is charged to increase its longevity.
Publish At:2020-10-08 13:24 | Read:413 | Comments:0 | Tags:Microsoft Hardware

QNAP warns customers of recent wave of ransomware attacks

QNAP has issued an advisory about a recent wave of ransomware attacks targeting its NAS storage devices and encrypting files.Last week, BleepingComputer broke the story of ransomware known as AgeLocker attacking publicly exposed QNAP NAS devices.AgeLocker ransom noteThe ransomware gets its name from its use of the encryption algorithm called Actually Go
Publish At:2020-09-30 14:05 | Read:469 | Comments:0 | Tags:Security Hardware ransomware

Explosive technology and 3D printers: a history of deadly devices

Hackers: They’ll turn your computer into a BOMB! “Hackers turning computers into bombs” is a now legendary headline, taken from the Weekly World News. It has rather set the bar for “people will murder you with computers” anxiety. Even those familiar with the headline may not have dug into the story too much on account of how silly
Publish At:2020-08-14 19:52 | Read:680 | Comments:0 | Tags:Hacking 3d printer hackers hacking hacks hardware IoT malwar

Can Antivirus Slow Down Your Computer?

Can Antivirus Slow Down Your Computer? November 25th, 2019 No Comments antivirus, PC security, performance We all want to protect our computer from viruses and cyberattacks. After all, it contains our most sensitive information – credit card numbers
Publish At:2019-11-25 10:05 | Read:1823 | Comments:0 | Tags:antivirus PC security performance hardware slow computer slo

WiNX: The Ultra-Portable Wireless Attacking Platform

When you are performing penetration tests for your customers, you need to build your personal arsenal. Tools, pieces of hardware and software are collected here and there depending on your engagements to increase your toolbox. To perform Wireless intrusion tests, I’m a big fan of the WiFi Pineapple. I’ve one for years (model MK5). It’s not
Publish At:2017-09-29 02:25 | Read:5962 | Comments:0 | Tags:Pentesting Security Social Engineering Hardware WiFi WiNX Wi

Popular hacking toolkit Metasploit adds hardware testing capabilities

The Metasploit hacking toolkit now includes a new hardware bridge that makes it easier for users to analyze hardware devices. The popular offensive hacking toolkit Metasploit now is powerful, it included a hardware bridge to conduct security tests on hardware. It is a great support to the users that have to test hardware, including IoT devices. Metasploit al
Publish At:2017-02-03 16:25 | Read:4079 | Comments:0 | Tags:Breaking News Hacking CAN Hardware Metasploit

Update your Belkin WeMo devices before they become botnet zombies

Owners of WeMo home automation devices should upgrade them to the latest firmware version, which was released this week to fix a critical vulnerability that could allow hackers to fully compromise them.The vulnerability was discovered by researchers from security firm Invincea in the Belkin WeMo Switch, a smart plug that allows users to remotely turn the
Publish At:2016-11-05 09:50 | Read:4553 | Comments:0 | Tags:Security Internet of Things Home Tech Hardware

Workstation software flaw exposes industrial control systems to hacking

The software used to program and deploy code to various Schneider Electric industrial controllers has a weakness that could allow hackers to remotely take over engineering workstations.The software, known as Unity Pro, runs on PCs used by engineers and includes a simulator for testing code before deploying it to programmable logic controllers (PLCs). The
Publish At:2016-10-25 16:55 | Read:4483 | Comments:0 | Tags:Security Hardware

Physical RAM attack can root Android and possibly other devices

Researchers have devised a new way to compromise Android devices without exploiting any software vulnerabilities and instead taking advantage of a physical design weakness in RAM chips. The attack technique could also affect other ARM and x86-based devices and computers.The attack stems from the push over the past decade to pack more DRAM (dynamic random
Publish At:2016-10-24 22:35 | Read:4275 | Comments:0 | Tags:Security Hardware Android

Flaw in Intel CPUs could help attackers defeat ASLR exploit defense

A feature in Intel's Haswell CPUs can be abused to reliably defeat an anti-exploitation technology that exists in all major operating systems, researchers have found.The technique, developed by three researchers from State University of New York at Binghamton and the University of California in Riverside, can be used to bypass address space layout random
Publish At:2016-10-20 01:10 | Read:3892 | Comments:0 | Tags:Security Hardware CPUs and Processors exploit

Israeli startup says its new software would have prevented Tesla hack

Israeli startup Karamba Security today announced a new product for securing the electronic control units (ECUs) of connected and self-driving vehicles that it said could have prevented a recent Tesla hack.Karamba's Carwall software uses a vehicle's factory software settings to discover noncompliant code in a car's ECUs and automatically creates security
Publish At:2016-09-30 05:15 | Read:5610 | Comments:0 | Tags:Car Tech Security Hardware Hacking

Teleporting a photon leads researchers to quantum security

Come on, admit it. You've always wanted to have Scotty beam you up to the USS Enterprise.But it's unlikely that you will be teleported anywhere in this lifetime… unless you're a photon.And that could mean more secure communications in the foreseeable future.A group of physicists announced this week that they have successfully teleported a photon, which i
Publish At:2016-09-21 20:20 | Read:4402 | Comments:0 | Tags:Emerging Technology Hardware Security


Tag Cloud