Tag: hardware security

  • Hacker News: Why did you write a new RTOS for CHERIoT?

    Source URL: https://cheriot.org/rtos/philosophy/history/2024/10/24/why-new-rtos.html Source: Hacker News Title: Why did you write a new RTOS for CHERIoT? Feedly Summary: Comments AI Summary and Description: Yes Summary: The text elaborates on the design and rationale behind the development of CHERIoT, a new real-time operating system (RTOS) that emphasizes hardware-software co-design and improves security through principles like least…

  • The Register: With record revenue, SK hynix brushes off suggestion of AI chip oversupply

    Source URL: https://www.theregister.com/2024/10/24/sk_hynix_q3_24/ Source: The Register Title: With record revenue, SK hynix brushes off suggestion of AI chip oversupply Feedly Summary: How embarrassing for Samsung SK hynix posted on Wednesday what it called its “highest revenue since its foundation" for Q3 2024 as it pledged to continue minuting more AI chips.… AI Summary and Description:…

  • The Register: Samsung phone users under attack, Google warns

    Source URL: https://www.theregister.com/2024/10/24/samsung_phone_eop_attacks/ Source: The Register Title: Samsung phone users under attack, Google warns Feedly Summary: Don’t ignore this nasty zero day exploit says TAG A nasty bug in Samsung’s mobile chips is being exploited by miscreants as part of an exploit chain to escalate privileges and then remotely execute arbitrary code, according to Google…

  • Slashdot: Linus Torvalds Growing Frustrated By Buggy Hardware, Theoretical CPU Attacks

    Source URL: https://linux.slashdot.org/story/24/10/21/1533228/linus-torvalds-growing-frustrated-by-buggy-hardware-theoretical-cpu-attacks?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Linus Torvalds Growing Frustrated By Buggy Hardware, Theoretical CPU Attacks Feedly Summary: AI Summary and Description: Yes Summary: Linus Torvalds expresses frustration with hardware vendors regarding security vulnerabilities and the challenges posed by both actual and hypothetical attacks. He highlights the burden placed on software developers when hardware issues…

  • Hacker News: Securing Hardware and Firmware Supply Chains

    Source URL: https://techcommunity.microsoft.com/t5/azure-infrastructure-blog/securing-hardware-and-firmware-supply-chains/ba-p/4268815 Source: Hacker News Title: Securing Hardware and Firmware Supply Chains Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text discusses critical innovations in hardware and firmware security within cloud data centers, particularly emphasizing Microsoft’s collaboration with the Open Compute Project (OCP) on the Caliptra initiative and the OCP Security Appraisal…

  • The Register: TSMC revenue up 36% as world+dog demands AI and smartphone chips

    Source URL: https://www.theregister.com/2024/10/17/tsmc_q3_2024/ Source: The Register Title: TSMC revenue up 36% as world+dog demands AI and smartphone chips Feedly Summary: Biggest semi contract manufacturer – and Nvidia supplier – building out capacity in US and Europe Taiwan’s semiconductor giant TSMC has reported a good third quarter with revenue up 36 percent over a year ago, due…

  • The Register: China’s infosec leads accuse Intel of NSA backdoor, cite chip security flaws

    Source URL: https://www.theregister.com/2024/10/16/china_intel_chip_security/ Source: The Register Title: China’s infosec leads accuse Intel of NSA backdoor, cite chip security flaws Feedly Summary: Uncle Sam having a secret way into US tech? Say it ain’t so A Chinese industry group has accused Intel of backdooring its CPUs, in addition to other questionable security practices while calling for…

  • Cloud Blog: Cloud CISO Perspectives: AI vendors should share vulnerability research. Here’s why

    Source URL: https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-ai-vendors-should-share-vulnerability-research-heres-why/ Source: Cloud Blog Title: Cloud CISO Perspectives: AI vendors should share vulnerability research. Here’s why Feedly Summary: Welcome to the first Cloud CISO Perspectives for October 2024. Today I’m discussing new AI vulnerabilities that Google’s security teams discovered and helped fix, and why it’s important for AI vendors to share vulnerability research…

  • Hacker News: Can You Get Root with Only a Cigarette Lighter?

    Source URL: https://www.da.vidbuchanan.co.uk/blog/dram-emfi.html Source: Hacker News Title: Can You Get Root with Only a Cigarette Lighter? Feedly Summary: Comments AI Summary and Description: Yes Summary: This text discusses hardware fault injection techniques, specifically targeting memory exploitation via electromagnetic interference (EMI) in laptops to facilitate local privilege escalation on Linux systems. This approach is novel in…

  • Cloud Blog: Announcing new Confidential Computing updates for even more hardware security options

    Source URL: https://cloud.google.com/blog/products/identity-security/new-confidential-computing-updates-for-more-hardware-security-options/ Source: Cloud Blog Title: Announcing new Confidential Computing updates for even more hardware security options Feedly Summary: Google Cloud is committed to ensuring that your data remains safe, secure, and firmly under your control. This begins with fortifying the very foundation of your compute infrastructure — your Compute Engine virtual machines (VMs)…