Security

Intel is collecting legacy hardware for security research

The big picture: Intel for the past few years has been collecting and cataloging its legacy hardware at a warehouse in Costa Rica, but not for a museum or other historical purpose. To ensure that customers across generations of hardware are protected against newly discovered attacks, Intel needs examples of its older hardware on hand to test with. As it turns out, this was a bit of a challenge for a while consider the company didn’t have a formal method of cataloging and storing legacy hardware until recently.

The chipmaker churns out lots of new and updated hardware each year,

Read More

Security software company McAfee acquired for $14 billion

Security software company McAfee is going private via a buyout from an investor group in a deal valued at more than $14 billion, the company announced Monday. Bloomberg first reported last week that a likely deal was imminent.

McAfee was founded in 1987 by John McAfee and became known for its computer antivirus software. McAfee, the founder, left McAfee, the company, in 1994, and the company was acquired by Intel in 2010 for $7.68 billion. In 2014, Intel announced it was phasing out the McAfee brand name for the security software and rebranding it as “Intel Security.”

Last October,

Read More

Revealed: The 10 worst hardware security flaws in 2021

MITRE, which publishes a list of top software vulnerabilities in conjunction with US Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), has now published a list of the most important hardware weaknesses, too.

MITRE publishes the the Common Weakness Enumeration (CWE) for software flaws, but this year has run a survey to create its first ever equivalent list for hardware flaws. 

The 2021 Hardware List aims to boost awareness of common hardware flaws and to prevent hardware security issues by educating designers and programmers on how to eliminate important mistakes early in the product development lifecycle.

SEE: Gartner

Read More

new SIM security solution for IAM

The average cost of a data breach, according to the latest research by IBM, now stands at USD 4.24 million, the highest reported. The leading cause? Compromised credentials, often caused by human error. Although these findings continue to show an upward trend in the wrong direction, the challenge itself is not new. What is new is the unprecedented and accelerated complexity of securing the workplace. CISOs/CIOs are dealing with legacy systems, cloud hosting, on-prem, remote workers, office based, traditional software, and SaaS.

How businesses adapted was laudable, but now that employees spread across locations, offices and homes – with

Read More

Semiconductors 101: Computer chips shortages lead to national security concerns

Computer chips, otherwise known as semiconductors, are quickly becoming a top national security priority for the United States and foreign governments, according to an anonymous industry insider who spoke exclusively with the Fox Investigative Unit. 

And they argued the stakes couldn’t be higher, to both the private sector and government bodies, when it comes to securing the supply chain of these fingernail-sized building blocks of nearly every aspect of the modern world. 

“Whoever wins the race for the next generation of semiconductor products eventually will have a major military, and maybe a dominant political and economic force on the global

Read More

The importance of computer security to store valuable information

In layman’s terms, computer security is all about safeguarding computing systems and their data.

As vital as it is to master computer security, everyone should learn it. About 90% of security measures are in the hands of the user. To keep people’s computers, devices, and data safe, everyone who uses a computer or smartphone should be able to comprehend how to do it. Anyone can help secure a computer.

People rely on computers to do their job and research; thus, their security must be taken seriously. In addition, the information safeguards and its implementation facilitates critical business operations.

Cyber security

Read More

Benchmarked: Do Windows 11’s Security Features Really Hobble Gaming Performance?

Microsoft is taking yet more backlash over its Windows 11 launch, as recent reports indicate that buyers of new pre-built systems could purportedly lose up to 28% of their gaming performance due to frame-rate-crushing security measures. That has gamers up in arms, so we did several rounds of testing in our labs with some of the best CPUs for gaming from Intel and AMD.

We found that the security mechanisms do reduce gaming performance, with the average impact on an 11th-gen Intel chip being in the 5% range (7% peak in one title). That may not seem like much to

Read More

Kryptor FPGA – Tiny MAX10 FPGA board works as a hardware security module (Crowdfunding)

Kryptor FPGA, sometimes just called Kryptor, is a compact Intel/Altera MAX10 FPGA development board mostly designed for encryption, and acting as a dedicated Hardware Security Module (HSM) with a custom soft-core from Skudo OÜ. But obviously, you could also use the FPGA board for other purposes.

Hardware encryption can be quite more secure than software-based encryption with reduced attack surfaces, especially since data processing can be done in the FPGA RAM. The HSM can be used to encrypt files, videos, emails, IoT messages, etc… from various hardware platforms including Arduino and Raspberry Pi boards. Contrary to closed-sourced commercial solutions, the

Read More

Voltage manipulation can bypass hardware security on AMD’s server CPUs

Why it matters: Researchers from the Technische Universität Berlin have demonstrated that AMD’s Secure Encrypted Virtualisation (SEV) technology can be defeated by manipulating input voltages, compromising the technology in a similar way to previous attacks against its Intel counterpart.

SEV relies on the Secure Processor (SP), a humble Arm Cortex-A5, to provide a root of trust in AMD EPYC CPUs (Naples, Rome and Milan — Zen 1 through 3).

The research paper — toting the amusing-yet-wordy title of “One Glitch to Rule Them All: Fault Injection Attacks Against AMD’s Secure Encrypted Virtualization” — describes how an attacker could compromise the

Read More