Reports of the death of cold-boot attacks have been greatly exaggerated. Cybersecurity wonks have long considered this a mostly solved problem, but new techniques have reanimated the decade-old ...
Part one of this pair of columns described “cold boot attacks” and their security implications, in particular for software-implemented full-disk encryption. Security expert Jurgen Pabel continues with ...
Until 2008, the consensus had been that there would be no practical way to remove a RAM chip from a computer system without losing all contained data. However, last July, researchers published a paper ...
F-Secure's Olle Segerdahl and Pasi Saarinen found a way to rewrite the non-volatile memory chip that contains the security settings, thus disabling memory overwriting. Share on Facebook (opens in a ...
It's funny how the demands of FOSS lovers are labelled unreasonable, yet every time they are proven to be right, with every product they criticize. Open firmware would make changing this a trivial (or ...
Whenever I'm having a bad day with the operating system and think software is terrible I can always remember that firmware is usually worse and blindly trusted by what runs on top of it. OSes have ...
Recent research from Princeton, McGraw Security Services illustrates how the lack of encryption specifications in legislation could put consumer data at risk. Last winter, researchers at Princeton ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results