Reverse Engineering Intellectual Property: Chip Ptychographic X-ray Laminography

Image Credit: Paul Scherrer Institute – Ptychographic X-ray Laminography
via Samuel K. Moore – writing for IEEE Spectrum Magazine – comes this outstanding article published on October 7th, 2019; in which, Mr. Moore details the application of well-know… Continue reading Reverse Engineering Intellectual Property: Chip Ptychographic X-ray Laminography

Black Hat USA 2019, Uriel Malin’s, Sara Bitan’s, Avishai Wool’s & Eli Biham’s ‘Rogue7: Rogue Engineering-Station Attacks On S7 Simatic PLCs’

Thanks to Black Hat for publishing the Black Hat 2019
tremendous conference videos on their YouTube Channel
Permalink
The post Black Hat USA 2019, Uriel Malin’s, Sara Bitan’s, Avishai Wool’s & Eli Biham’s ‘Rogue7: Ro… Continue reading Black Hat USA 2019, Uriel Malin’s, Sara Bitan’s, Avishai Wool’s & Eli Biham’s ‘Rogue7: Rogue Engineering-Station Attacks On S7 Simatic PLCs’

Researchers: SIMJacker Flaw Permits Device Hijack With SMS

Bad – very bad – news for SMS users, mobile device owners, manufacturers and carriers. h/t

“Dubbed “SimJacker,” the vulnerability resides in a particular piece of software, called the S@T Browser (a dynamic SIM toolkit), embedded on most SIM cards th… Continue reading Researchers: SIMJacker Flaw Permits Device Hijack With SMS

DEF CON 27, Early Release, WillC’s ‘Phreaking Elevators’

Thanks to Def Con 27 for early publishing their outstanding conference videos on their YouTube Channel.
Permalink
The post DEF CON 27, Early Release, WillC’s ‘Phreaking Elevators’ appeared first on Security Boulevard.
Continue reading DEF CON 27, Early Release, WillC’s ‘Phreaking Elevators’

Serious flaws in six printer brands discovered, fixed

There are many ways to compromise company data, but IT teams often overlook one of the most serious: the humble printer. Continue reading Serious flaws in six printer brands discovered, fixed

Defense in Depth: Securing the New Network Edge

A new hardware-based defense-in-depth security strategy could better protect against east-west attacks The use of application-level network segmentation is growing in popularity to protect enterprise data center servers as they become the new network … Continue reading Defense in Depth: Securing the New Network Edge

Shmoocon 2019, Falcon Darkstar’s ‘Looking For Malicious Hardware Implants With Minimal Equipment’

Source Credit: Shmoo Con 2019 at Archive.org, also available at 0xdade’s YouTube Channel. Enjoy!
Permalink
The post Shmoocon 2019, Falcon Darkstar’s ‘Looking For Malicious Hardware Implants With Minimal Equipment’ appeared first on … Continue reading Shmoocon 2019, Falcon Darkstar’s ‘Looking For Malicious Hardware Implants With Minimal Equipment’