Can my ISP router, which is set in bridge mode be theoretically hacked or is the risk at the router behind the "modem"?

I am using an ISP provided router in bridge mode with my own router.

Where is the risk of getting hacked?
Can my ISP provided router in bridge mode (=modem) be hacked?
Can it get firmware updates when in bridge mode?

Continue reading Can my ISP router, which is set in bridge mode be theoretically hacked or is the risk at the router behind the "modem"?

Has there ever been a case of dangerous industrial malware, which would destroy motherboards and similar PC components and how to protect [duplicate]

I heard many years ago from word of mouth that this kind of malware exists, which could for example blow up capacitors in your PC.

Has such malware or something even remotely similar ever existed?

How do you technically detect such malwa… Continue reading Has there ever been a case of dangerous industrial malware, which would destroy motherboards and similar PC components and how to protect [duplicate]

Is enabling software flow-offloading in OpenWRT’s firewall settings dangerous?

First of all, I did ask this on OpenWrt Forums already, I thought maybe someone here knows this.
I noticed that my internet speed gets limited when this feature is not enabled, this feature is also marked as experimental, any clue what it … Continue reading Is enabling software flow-offloading in OpenWRT’s firewall settings dangerous?

Is enabling software flow-offloading in OpenWRT’s firewall settings dangerous?

First of all, I did ask this on OpenWrt Forums already, I thought maybe someone here knows this.
I noticed that my internet speed gets limited when this feature is not enabled, this feature is also marked as experimental, any clue what it … Continue reading Is enabling software flow-offloading in OpenWRT’s firewall settings dangerous?

Does my jailbroken with root access iPad store any forensic evidence for usage of the lightning connector?

I am willing to give my iPad for a repair shop, but I would like to know whether they tamper with the OS in any way.

Is there any way with or without special software to gather forensic evidence about whether the lightning port was used t… Continue reading Does my jailbroken with root access iPad store any forensic evidence for usage of the lightning connector?