Security News

BestCrypt by Jetico expands cross-platform protection to computers with T2 chip
2020-03-03 01:30

Jetico, long-trusted pioneer in data encryption, announced support for Mac computers with a T2 security chip. With this update, BestCrypt Volume Encryption - Enterprise Edition becomes the industry's most comprehensive enterprise encryption software for Windows and macOS. "Native OS encryption tools might be an easy way to get started with data protection. Yet there's a critical limitation. Their security is bound to only some versions of a single operating system," states Jetico CEO, Michael Waksman.

Tiny cryptographic ID chip can help combat hardware counterfeiting
2020-02-28 05:00

To combat supply chain counterfeiting, which can cost companies billions of dollars annually, MIT researchers have invented a cryptographic ID tag that's small enough to fit on virtually any product and verify its authenticity. Wireless ID tags are becoming increasingly popular for authenticating assets as they change hands at each checkpoint.

Remember the Clipper chip? NSA's botched backdoor-for-Feds from 1993 still influences today's encryption debates
2020-01-27 23:32

More than a quarter century after its introduction, the failed rollout of hardware deliberately backdoored by the NSA is still having an impact on the modern encryption debate. Known as Clipper, the encryption chipset developed and championed by the US government only lasted a few years, from 1993 to 1996.

Cable Haunt: Millions of Cable Modems With Broadcom Chips Vulnerable to Attacks
2020-01-10 15:11

Hackers may be able to remotely take complete control of cable modems from various manufacturers due to a critical vulnerability affecting a middleware component shipped with some Broadcom chips. They've reproduced the attack on ten cable modems from Sagemcom, Netgear, Technicolor and COMPAL, but other manufacturers also likely use the Broadcom chip containing the vulnerability.

Hash snag: Security shamans shame SHA-1 standard, confirm crucial collisions citing circa $45k chip cost
2020-01-08 22:21

Back in 2012, the same year America's National Institute of Standards Technology advised against using SHA-1 for applications that require collision resistance, cryptographer Bruce Schneier estimated that the cloud computing bill for carrying out a SHA-1 attack would be about $2.77m. And he projected the cost would fall to about $43,000 by 2021. In their paper, Leurent and Peyrin put the theoretical cost at $11,000 for a SHA-1 collision and $45,000 for a chosen-prefix collision.

Plundervolt Attack Uses Voltage Changes to Steal Secrets From Intel Chips
2019-12-11 21:13

A newly disclosed attack method targeting Intel processors employs voltage modifications to expose data protected using Intel's Software Guard Extensions (SGX). read more

Plundervolt Attack Uses Voltage to Steal Data From Intel Chips
2019-12-11 21:07

A newly disclosed attack targeting Intel processors utilizes CPU voltage modifications to expose data stored using Intel's Secure Guard Extensions (SGX).  read more

Intel Chips Vulnerable to 'Plundervolt' Attack
2019-12-11 13:48

Dropping Voltage to CPUs Can Force Sensitive Data DisclosureIntel issued a firmware update on Tuesday to mitigate an attack developed by researchers, dubbed Plundervolt, which uses voltage...

Google Will Award $1M-Plus to People Who Can Hack Titan M Security Chip
2019-11-22 11:53

The company expanded its Android bug bounty program as one of several recent moves to ramp up mobile security.

Google offers up to $1.5 million bounty for remotely hacking Titan M chip
2019-11-22 04:52

With its latest announcement to increase bug bounty rewards for finding and reporting critical vulnerabilities in the Android operating system, Google yesterday set up a new challenging level for...