Work on DDR5 (Double Data Rate 5), a standard for computer memory chips, has already begun, JEDEC, a standards body for the microelectronics industry, said on Thursday.
A new tool released on GitHub last week can help paranoid sysadmins keep track of whenever someone plugs in or disconnects an USB-based device from high-value workstations.
Scientists from two Israeli universities have come up with a way to use flatbed scanners as relay points when sending commands to malware installed on an air-gapped computer. Further research also revealed the scanner could also be used to relay stolen data to a nearby attacker.
A new attack on smart TVs allows a malicious actor to take over devices using rogue DVB-T (Digital Video Broadcasting — Terrestrial) signals, get root access on the smart TV, and use the device for all sorts of nasty actions, ranging from DDoS attacks to spying on end users.
Users of new CPU architectures will not receive Windows 7 and 8.1 updates anymore, according to a Microsoft support topic published last week.
A woman traveling on a flight from Beijing, China to Melbourne, Australia suffered burns on her face and hands after her battery-powered headphones exploded.
In a research paper published at the end of February, a team of five scientists from the Graz University of Technology has described a novel method of leaking data from SGX enclaves, a secure environment created by Intel CPUs for storing sensitive information for each process, such as encryption keys, passwords, and other.
The USG is an USB attachment that allows users to connect USB flash drives and other USB devices to their computer without any of the risks.
For many years, MAC Address Randomization was slated as the next big thing for protecting user privacy on the modern Internet.
What started as an analysis of a simple security flaw in a random wireless IP camera turned into seven vulnerabilities that affect over 1,250 camera models and expose nearly 200,000 cameras to hacking.
Believe it or not, there are DVRs and IP cameras available online today that you could hack just like in the movies, in a matter of seconds.
Multiple Western Digital MyCloud Networked Attached Storage (NAS) devices are affected by several security flaws, varying in severity, that allow attackers to bypass authentication, execute code on the device, and upload or download user data.
Security researchers have discovered a hidden backdoor in the firmware of DblTek GoIP GSM gateways that allows Telnet access to affected devices.
Custom-made malware installed on an offline computer can use a hard drive's LED to send out sensitive data from infected computers to nearby cameras.
Have you ever noticed that all Windows built-in drivers have the same value in the last update field? Have you wondered why? If you read Windows update logs, it's pretty obvious that Microsoft updates its drivers, so why isn't that date changing?
A grey-hat hacker going by the name of Stackoverflowin says he's pwned over 150,000 printers that have been left accessible online.
Knowing that printers are everywhere and they can leak sensitive information, these devices are precious reconnaissance and pivot points for any hacker trying to breach sensitive enterprise networks.
Netgear has issued patches that resolve a simple bug in the firmware of 20 different router models that allow an attacker to expose the router's web panel admin password, which they can use to take over the device.