This Week in Security: ClamAV, The AMD Leak, and The Unencrypted Power Grid

Cisco’s ClamAV has a heap-based buffer overflow in its OLE2 file scanning. That’s a big deal, because ClamAV is used to scan file attachments on incoming emails. All it takes …read more Continue reading This Week in Security: ClamAV, The AMD Leak, and The Unencrypted Power Grid

Two Vintage Calculators In One

The FPGA revolution that occurred within the past few decades was a boon to many people interested in “antique” electronics. The devices “wire together” logic elements as needed rather than emulating chips completely in a software layer, which makes them uniquely suited for replicating chips that are rare, no longer …read more

Continue reading Two Vintage Calculators In One

Intel CPUs Undermined By Fresh Speculative Execution Flaws

‘Foreshadow” and other vulnerabilities in Intel processors can be exploited to steal sensitive information stored inside personal computers or personal clouds. Continue reading Intel CPUs Undermined By Fresh Speculative Execution Flaws