Security News

Most Intel chipsets released in the past five years are affected by a vulnerability that can be exploited to obtain encrypted data and compromise data protection technologies, Positive Technologies revealed on Thursday. According to Positive Technologies, CVE-2019-0090 is an unfixable vulnerability that affects the Converged Security and Management Engine boot ROM on most Intel chipsets and system on chips, except for Ice Point chipsets.

Semtech, a leading supplier of high performance analog and mixed signal semiconductors and advanced algorithms, recently launched the AVX chipset for multimedia connectivity over both copper category cabling and optical fiber. The AVX200T flagship part offers unprecedented levels of performance for AV extension applications, such as standalone point-to-point cable extenders, matrix switches and KVM extension.

Chipzilla downplays cunning data-snooping side-channel technique Video It is possible to discern someone's SSH password as they type it into a terminal over the network, say infosec gurus who have...

Researcher creates 'Selfblow' proof-of-concept attack for exploiting a vulnerability that exists in "every single Tegra device released so far".

The rapid adoption of artificial intelligence (AI) for practical business applications has introduced a number of uncertainties and risk factors across virtually every industry, but one fact is...

A vulnerability in the firmware of a Wi-Fi chipset that is widely used in laptops, streaming, gaming and a variety of “smart” devices can be exploited to compromise them without user interaction....

The Zigbee Alliance announced that findings from market research firm ON World project a favorable market for connected devices leveraging Zigbee Alliance technologies over the next five years. ON...

Researchers at EURECOM S3 Group found that they can extract crypto keys from a set of run-of-the-mill communications chips just by listening to the noise it makes.

A vulnerability in NVIDIA's Tegra chipsets allows for the execution of custom code on locked-down devices, security researcher Kate Temkin reveals. read more

Researcher reveals demo USB attack code, full release in June Security researcher Kate Temkin has released proof-of-concept code to launch an exploit chain called Fusée Gelée, which relies on an...