Shmoocon 2020 – Chris Lyne’s and Nick Miles’ ‘Extracting An ELF From An ESP32’

Thanks to 0xdade for publishing these outstanding Shmoocon 2020 Convention videos via the 0xdade YouTube channel and the 0xdade Shmoocon 2020 Playlist for everyone to view, learn and, of course, enjoy.
Permalink
The post Shmoocon 2020 – Chris Lyn… Continue reading Shmoocon 2020 – Chris Lyne’s and Nick Miles’ ‘Extracting An ELF From An ESP32’

The Overarching Challenge To The American Way Of Life: Predatory John Deere Fighting The Right (And Capability) To Repair

Quite likely, the single most important video you will see today.
Permalink
The post The Overarching Challenge To The American Way Of Life: Predatory John Deere Fighting The Right (And Capability) To Repair appeared first on Security Boulevard.
Continue reading The Overarching Challenge To The American Way Of Life: Predatory John Deere Fighting The Right (And Capability) To Repair

Eclypsium Researchers Demonstrate Direct Memory Attacks

Researchers from Eclypsium, a provider of secure firmware, disclosed this week that they have been able to launch successful direct memory access (DMA) attacks that bypass security frameworks such as UEFI Secure Boot, Intel Boot Guard, HP Sure Start a… Continue reading Eclypsium Researchers Demonstrate Direct Memory Attacks

DEF CON 27, Bio Hacking Village, Dr Avi Rubin’s ‘Beyond The Firmware: The Attack Surface of a Networked Medical Device’

Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn.
Permalink
The post DEF CON 27, Bio Hacking Village, Dr Avi Rubin’s &#8216… Continue reading DEF CON 27, Bio Hacking Village, Dr Avi Rubin’s ‘Beyond The Firmware: The Attack Surface of a Networked Medical Device’

36C3: Open Source is Insufficient to Solve Trust Problems in Hardware

With open source software, we’ve grown accustomed to a certain level of trust that whatever we are running on our computers is what we expect it to actually be. Thanks to hashing and public key signatures in various parts in the development and deployment cycle, it’s hard for a third …read more

Continue reading 36C3: Open Source is Insufficient to Solve Trust Problems in Hardware

DEF CON 27, Wireless Village, Hak5Crew’s ‘Introducing New Hak5 Gear’

Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn.
Permalink
The post DEF CON 27, Wireless Village, Hak5Crew’s ‘Introd… Continue reading DEF CON 27, Wireless Village, Hak5Crew’s ‘Introducing New Hak5 Gear’

DEF CON 27, Wireless Village, Nishant Sharma’s ‘Developing Wifi Access Point Rootkits’

Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn.
Permalink
The post DEF CON 27, Wireless Village, Nishant Sharma’s ‘… Continue reading DEF CON 27, Wireless Village, Nishant Sharma’s ‘Developing Wifi Access Point Rootkits’

Litany of Bad Behavior At Bezos’ RING

Based on outrage as to the marketing tactics of Amazon’s RING unit (and the serious flaws discovered weekly with this hardware home security solution), I predict signifant lawfare targeting the company, for both it’s privacy related SNAFUs (and the pr… Continue reading Litany of Bad Behavior At Bezos’ RING

Researchers Discover TPM-Fail Vulnerabilities Affecting Billions of Devices

A team of cybersecurity researchers today disclosed details of two new potentially serious CPU vulnerabilities that could allow attackers to retrieve cryptographic keys protected inside TPM chips manufactured by STMicroelectronics or firmware-based Int… Continue reading Researchers Discover TPM-Fail Vulnerabilities Affecting Billions of Devices