Get a Pentest and security assessment of your IT network.

Cyber Security

Researchers Discover TPM-Fail Vulnerabilities Affecting Billions of Devices

A team of cybersecurity researchers disclosed details of two new potentially serious CPU vulnerabilities that could allow attackers to retrieve cryptographic keys protected inside TPM chips. TMP technology is being used widely by billion of desktops, laptops, servers, smartphones, and even by Internet-of-Things (IoT) devices to protect encryption keys, passwords, and digital certificates. The vulnerabilities leverage a timing-based side-channel attack to recover cryptographic keys that are otherwise supposed to remain safely inside the chips. A local adversary can recover the ECDSA key from Intel fTPM in 4-20 minutes.

Source: https://thehackernews.com/2019/11/tpm-encryption-keys-hacking.html

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security