ETH Zurich researchers have discovered a serious security vulnerability in computer hardware. The vulnerability, called "Retbleed," affects microprocessors from market leaders Intel and AMD. All commercially available operating systems worldwide that use these processors are affected.
ETH Zurich researchers have discovered a serious security vulnerability in computer hardware. The vulnerability, called "Retbleed," affects microprocessors from market leaders Intel and AMD. All commercially available operating systems worldwide that use these processors are affected.
Explore IoT security solutions with insights into the threat landscape, secure architectures, and best practices for engineers building resilient connected systems.
A critical flaw in random number generators puts the security of billions of low-cost IoT devices at risk. This means a new approach for generating random numbers is needed, which can be found in extracting entropy from SRAM behaviour.
Explore IoT security solutions with insights into the threat landscape, secure architectures, and best practices for engineers building resilient connected systems.
Explore Business Tai Chi, a values-first model for deep-tech companies that balances financial sustainability, engineering learning, and team alignment to build resilient semiconductor innovation.
ETH Zurich researchers have discovered a serious security vulnerability in computer hardware. The vulnerability, called "Retbleed," affects microprocessors from market leaders Intel and AMD. All commercially available operating systems worldwide that use these processors are affected.
In this episode, we talk about how a group of researchers were inspired by the adaptive immune system found in humans to fortify vulnerable neural networks and a joint effort between universities to create electric skin with unmatched performance.
Rutgers researchers have published the first work examining how hackers could use popular virtual reality headsets to steal sensitive information communicated via voice-command, including credit card data and passwords.
The CyberSpec framework is designed to detect anomalous behavior linked to cyber-attacks against crowd-sensing spectrum sensors, even when said sensors are running on lightweight resource-constrained hardware like a Raspberry Pi.
Article #5 of the IoT Foundation Series. Internet-connected security devices provide a fast and easy way to create a home security system. But are they also creating opportunities for security weakness?
LaserShark: KIT researchers investigate hidden communication via optical channels - data can be transmitted to light-emitting diodes already built into devices
A critical flaw in random number generators puts the security of billions of low-cost IoT devices at risk. This means a new approach for generating random numbers is needed, which can be found in extracting entropy from SRAM behaviour.
The future seems rosy for smart manufacturing, but there is a downside. Cybercrime is on the rise, and though it might not seem as though industry presents a particularly valuable target, hackers think otherwise.
In this episode, we talk about NASA’s new packable solar sail for deep space travel, how to prevent cyber attacks by fixing memory vulnerabilities, and how flying robots could be the solution to our space trash problem.