NetSpectre — New Remote Spectre Attack Steals Data Over the Network

A team of security researchers has discovered a new Spectre attack that can be launched over the network, unlike all other Spectre variants that require some form of local code execution on the target system.

Dubbed “NetSpectre,” the new remote side-c… Continue reading NetSpectre — New Remote Spectre Attack Steals Data Over the Network

Google Enables ‘Site Isolation’ Feature By Default For Chrome Desktop Users

Google has by default enabled a security feature called “Site Isolation” in its web browser with the release of Chrome 67 for all desktop users to help them protect against many online threats, including Spectre and Meltdown attack.

Site Isolation is … Continue reading Google Enables ‘Site Isolation’ Feature By Default For Chrome Desktop Users

Google Enables ‘Site Isolation’ Feature By Default For Chrome Desktop Users

Google has by default enabled a security feature called “Site Isolation” in its web browser with the release of Chrome 67 for all desktop users to help them protect against many online threats, including Spectre and Meltdown attack.

Site Isolation is … Continue reading Google Enables ‘Site Isolation’ Feature By Default For Chrome Desktop Users

OpenBSD Disables Intel Hyper-Threading to Prevent Spectre-Class Attacks

Security-oriented BSD operating system OpenBSD has decided to disable support for Intel’s hyper-threading performance-boosting feature, citing security concerns over Spectre-style timing attacks.

Introduced in 2002, Hyper-threading is Intel’s implemen… Continue reading OpenBSD Disables Intel Hyper-Threading to Prevent Spectre-Class Attacks

New ‘Lazy FP State Restore’ Vulnerability Found in All Modern Intel CPUs

Hell Yeah! Another security vulnerability has been discovered in Intel chips that affects the processor’s speculative execution technology—like Specter and Meltdown—and could potentially be exploited to access sensitive information, including encryptio… Continue reading New ‘Lazy FP State Restore’ Vulnerability Found in All Modern Intel CPUs

A Close Eye on Power Exposes Private Keys

Hardware wallets are devices used exclusively to store the highly sensitive cryptographic information that authenticates cryptocurrency transactions. They are useful if one is worried about the compromise of a general purpose computer leading to the loss of such secrets (and thus loss of the funds the secrets identify). The idea is to move the critical data away from a more vulnerable network-connected machine and onto a device without a network connection that is unable to run other software. When designing a security focused hardware devices like hardware wallets it’s important to consider what threats need to be protected against. More …read more

Continue reading A Close Eye on Power Exposes Private Keys

Watching the Watchers: Are You The Star Of an Encrypted Drone Video Stream?

Small aircraft with streaming video cameras are now widely available, for better or worse. Making eyes in the sky so accessible has resulted in interesting footage that would have been prohibitively expensive to capture a few years ago, but this new creative frontier also has a dark side when used to violate privacy. Those who are covering their tracks by encrypting their video transmission should know researchers at Ben-Gurion University of the Negev demonstrated such protection can be breached.

The BGU team proved that a side-channel analysis can be done against behavior common to video compression algorithms, as certain changes …read more

Continue reading Watching the Watchers: Are You The Star Of an Encrypted Drone Video Stream?

Watching the Watchers: Are You The Star Of an Encrypted Drone Video Stream?

Small aircraft with streaming video cameras are now widely available, for better or worse. Making eyes in the sky so accessible has resulted in interesting footage that would have been prohibitively expensive to capture a few years ago, but this new creative frontier also has a dark side when used to violate privacy. Those who are covering their tracks by encrypting their video transmission should know researchers at Ben-Gurion University of the Negev demonstrated such protection can be breached.

The BGU team proved that a side-channel analysis can be done against behavior common to video compression algorithms, as certain changes …read more

Continue reading Watching the Watchers: Are You The Star Of an Encrypted Drone Video Stream?

Meltdown and Spectre CPU Flaws Affect Intel, ARM, AMD Processors

Unlike the initial reports suggested about Intel chips being vulnerable to some severe ‘memory leaking’ flaws, full technical details about the vulnerabilities have now been emerged, which revealed that almost every modern processor since 1995 is vulne… Continue reading Meltdown and Spectre CPU Flaws Affect Intel, ARM, AMD Processors