HackDig : Dig high-quality web security articles

Busting the Myths of Hardware Based Security

Many experts often overlook hardware based security and its vital importance in establishing a secure workspace. When it comes to cybersecurity, everyone likes to talk about software and the dangers that it poses. However, people often overlook hardware-based security and its vital importance in establishing a secure workspace. This is attributed to a gen
Publish At:2022-08-03 05:26 | Read:322 | Comments:0 | Tags:Breaking News Security hacking news Hardware Hardware Based

Anker Eufy smart home hubs exposed to RCE attacks by critical flaw

Anker’s central smart home device hub, Eufy Homebase 2, was vulnerable to three vulnerabilities, one of which is a critical remote code execution (RCE) flaw.Homebase 2 is the video storage and networking gateway for all Anker’s Eufy smart home devices, including video doorbells, indoor security cameras, smart locks, alarm systems, and more.Homeba
Publish At:2022-06-16 14:54 | Read:1088 | Comments:0 | Tags:Security Hardware

New PACMAN hardware attack targets Macs with Apple M1 CPUs

A new hardware attack targeting Pointer Authentication in Apple M1 CPUs with speculative execution enables attackers to gain arbitrary code execution on Mac systems.Pointer Authentication is a security feature that adds a cryptographic signature, known as pointer authentication code (PAC), to pointers that allow the operating system to detect and block unexp
Publish At:2022-06-10 18:51 | Read:1114 | Comments:0 | Tags:Security Apple Hardware

NVIDIA has open-sourced its Linux GPU kernel drivers

NVIDIA has published the source code of its Linux kernel modules for the R515 driver, allowing developers to provide greater integration, stability, and security for Linux distributions.The source code has been published to NVIDIA's GitHub repository under a dual licensing model that combines the GPL and MIT licenses, making the modules legally re-distr
Publish At:2022-05-12 10:55 | Read:947 | Comments:0 | Tags:Linux Hardware

Cisco vulnerability lets hackers craft their own login credentials

p style="text-align:center">Cisco has released a security advisory to warn about a critical vulnerability (CVSS v3 score: 10.0), tracked as CVE-2022-20695, impacting the Wireless LAN Controller (WLC) software. The security flaw allows remote attackers to log in to target devices through the management interface without using a valid password.The bug inv
Publish At:2022-04-15 14:40 | Read:811 | Comments:0 | Tags:Security Hardware Vulnerability hack

AMD confirms GPU driver bug overclocks CPUs without permission

p style="text-align:center">AMD is investigating an issue in its GPU software suite that causes an auto-adjustment of AMD Ryzen CPU performance settings for users without permission.This problem was reported by many users in the past weeks, who suddenly noticed inexplicable BIOS setting changes for which they were never asked to approve.The chipmaker confirm
Publish At:2022-04-06 10:44 | Read:1763 | Comments:0 | Tags:Hardware

Western Digital My Cloud OS update fixes critical vulnerability

p style="text-align:center">Western Digital has released new My Cloud OS firmware to fix a vulnerability exploited by bug hunters during the Pwn2Own 2021 hacking competition to achieve remote code execution.The flaw, tracked as CVE-2022-23121, was exploited by the NCC Group’s EDG team members and relied on the open-source service named &ldquo
Publish At:2022-03-24 18:35 | Read:2290 | Comments:0 | Tags:Security Hardware Cloud Vulnerability

HP patches 16 UEFI firmware bugs allowing stealthy malware infections

HP has disclosed 16 high-impact UEFI firmware vulnerabilities that could allow threat actors to infect devices with malware that gain high privileges and remain undetectable by installed security software.These vulnerabilities affect multiple HP models, including laptops, desktop computers, PoS systems, and edge computing nodes.The flaws were discovered
Publish At:2022-03-08 14:39 | Read:848 | Comments:0 | Tags:Security Hardware

How to speed up your computer or laptop

Why do machines always throw a tantrum when you are in a hurry? It’s called Murphy’s Law which some people may know as the butter side down rule. Anything that can go wrong will go wrong. And usually at a time when it is most inconvenient. That being said, there are ways to speed things up. Let’s have a look at some options to fix slow computers. Why i
Publish At:2022-02-02 08:50 | Read:1098 | Comments:0 | Tags:How-tos hardware Malwarebytes PUPs software speed up

QNAP force-installs update after DeadBolt ransomware hits 3,600 devices

QNAP force-updated customer's Network Attached Storage (NAS) devices with firmware containing the latest security updates to protect against the DeadBolt ransomware, which has already encrypted over 3,600 devices.On Tuesday, BleepingComputer reported on a new ransomware operation named DeadBolt that was encrypting Internet-exposed QNAP NAS devices
Publish At:2022-01-28 06:46 | Read:2139 | Comments:0 | Tags:Security Hardware ransomware

Nintendo warns of imitation websites and suspicious hardware

Brave indeed is the soul who decides to take on Nintendo with scam-filled behaviour online. The console legends have a long history of crunching down on fraud, as well as gaming past-times some would consider to be harmless. Whether you create fan-made games, offer up plundered ROMs for use in emulators, or even just want to rent out some titles: Nintendo
Publish At:2022-01-18 12:46 | Read:1238 | Comments:0 | Tags:Scams bogus fake website hardware nintendo sales store

Hundreds of thousands of MikroTik devices still vulnerable to botnets

Approximately 300,000 MikroTik routers are vulnerable to critical vulnerabilities that malware botnets can exploit for cryptomining and DDoS attacks.MikroTik is a Latvian manufacturer of routers and wireless ISPs who has sold over 2,000,000 devices globally.In August, the Mēris botnet exploited vulnerabilities in MikroTik routers to create an army of de
Publish At:2021-12-09 10:41 | Read:1001 | Comments:0 | Tags:Security Hardware botnet

Nine WiFi routers used by millions were vulnerable to 226 flaws

Security researchers analyzed nine popular WiFi routers and found a total of 226 potential vulnerabilities in them, even when running the latest firmware.The tested routers are made by Asus, AVM, D-Link, Netgear, Edimax, TP-Link, Synology, and Linksys, and are used by millions of people.The front-runners in terms of the number of vulnerabilities are the TP-L
Publish At:2021-12-02 10:41 | Read:1036 | Comments:0 | Tags:Security Hardware

New Rowhammer technique bypasses existing DDR4 memory defenses

Researchers have developed a new fuzzing-based technique called 'Blacksmith' that revives Rowhammer vulnerability attacks against modern DRAM devices that bypasses existing mitigations.The emergence of this new Blacksmith method demonstrates that today's DDR4 modules are vulnerable to exploitation, allowing a variety of attacks to be conducted.The Rowhammer
Publish At:2021-11-15 18:32 | Read:1558 | Comments:0 | Tags:Security Hardware

High severity BIOS flaws affect numerous Intel processors

Intel has disclosed two high-severity vulnerabilities that affect a wide range of Intel processor families, allowing threat actors and malware to gain higher privilege levels on the device.The flaws were discovered by SentinelOne and are tracked as CVE-2021-0157 and CVE-2021-0158, and both have a CVSS v3 score of 8.2 (high).The former concerns the insufficie
Publish At:2021-11-15 14:36 | Read:1821 | Comments:0 | Tags:Security Hardware IOS


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud