Have you ever noticed that all Windows built-in drivers have the same value in the last update field? Have you wondered why? If you read Windows update logs, it's pretty obvious that Microsoft updates its drivers, so why isn't that date changing?
A grey-hat hacker going by the name of Stackoverflowin says he's pwned over 150,000 printers that have been left accessible online.
Knowing that printers are everywhere and they can leak sensitive information, these devices are precious reconnaissance and pivot points for any hacker trying to breach sensitive enterprise networks.
Netgear has issued patches that resolve a simple bug in the firmware of 20 different router models that allow an attacker to expose the router's web panel admin password, which they can use to take over the device.
Attackers with access to a device can take control over a target's computer and bypass all local security systems by abusing a hardware debugging interface included with Intel CPUs, which in recent years has become accessible via an external USB 3.0 port.
A team of researchers from universities in Singapore and Germany have found a way to turn the latest models of RAM memory chips into data processing units and effectively eliminate the need for a CPU.
The security protocol that governs how virtual machines share data on a host system powered by AMD Zen processors has been found to be insecure, at least in theory, by Felicitas Hetzelt and Robert Buhren, two scientists at the Security in Telecommunications Department at the Technical University of Berlin, Germany.
A new battery technology developed in the US will take seconds to charge, last over a week, and survive 30,000 recharge cycles, 20 times more than regular Lithium-ion batteries deployed today.
Hardware hacker Samy Kamkar has released a new tool called PoisonTap that is capable of a plethora of malicious actions, all of which work even against password-protected computers on which an attacker can't access the desktop.
Researchers are working on a new CPU chip design that will extend the fight against malware at the hardware level in an attempt to bolster computers, mobiles, and other devices against the rising wave of security threats.