Get a Pentest and security assessment of your IT network.

Cyber Security

SSD Drives Vulnerable to Attacks That Corrupt User Data

“Programming vulnerabilities”” could be called “”programming flaws”” that can be exploited to alter stored data or shorten the SSD’s lifespan. This type of attack is similar to the attack on classic RAM memory chips

Source: causing the data to be corrupted.”

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security