Tag: physical access

  • The Register: Apple warns ‘extremely sophisticated attack’ may be targeting iThings

    Source URL: https://www.theregister.com/2025/02/11/apple_ios_ipados_patches/ Source: The Register Title: Apple warns ‘extremely sophisticated attack’ may be targeting iThings Feedly Summary: Cupertino mostly uses bland language when talking security, so this sounds nasty Apple has warned that some iPhones and iPads may have been targeted by an “extremely sophisticated attack” and has posted patches that hopefully prevent it.……

  • Hacker News: New Apple CPU side-channel attacks steals data from browsers

    Source URL: https://www.bleepingcomputer.com/news/security/new-apple-cpu-side-channel-attack-steals-data-from-browsers/ Source: Hacker News Title: New Apple CPU side-channel attacks steals data from browsers Feedly Summary: Comments AI Summary and Description: Yes Summary: A recent disclosure by security researchers reveals critical side-channel vulnerabilities in modern Apple processors, specifically regarding the FLOP and SLAP attacks. These flaws exploit speculative execution mechanisms to leak sensitive…

  • Hacker News: Windows BitLocker – Screwed Without a Screwdriver

    Source URL: https://neodyme.io/en/blog/bitlocker_screwed_without_a_screwdriver Source: Hacker News Title: Windows BitLocker – Screwed Without a Screwdriver Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text discusses a security vulnerability dubbed “bitpixie” that affects BitLocker encryption on Windows devices, allowing unauthorized access to the encryption key without the need for physical disassembly of the machine. It…

  • Hacker News: Bypassing disk encryption on systems with automatic TPM2 unlock

    Source URL: https://oddlama.org/blog/bypassing-disk-encryption-with-tpm2-unlock/ Source: Hacker News Title: Bypassing disk encryption on systems with automatic TPM2 unlock Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text delves into the security implications of using Trusted Platform Module (TPM2) for automatic disk unlocking in Linux systems. It uncovers vulnerabilities present in popular implementations (specifically with clevis…

  • The Register: Raspberry Pi hands out prizes to all in the RP2350 Hacking Challenge

    Source URL: https://www.theregister.com/2025/01/16/raspberry_pi_awards_prizes_for/ Source: The Register Title: Raspberry Pi hands out prizes to all in the RP2350 Hacking Challenge Feedly Summary: Power-induced glitches, lasers, and electromagnetic fields are all tools of the trade Raspberry Pi has given out prizes for extracting a secret value from the one-time-programmable (OTP) memory of the Raspberry Pi RP2350 microcontroller…

  • Hacker News: AMD’s trusted execution environment blown wide open by new BadRAM attack

    Source URL: https://arstechnica.com/information-technology/2024/12/new-badram-attack-neuters-security-assurances-in-amd-epyc-processors/ Source: Hacker News Title: AMD’s trusted execution environment blown wide open by new BadRAM attack Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses significant vulnerabilities related to physical access to cloud servers, particularly spotlighting a proof-of-concept attack known as BadRAM that exploits security assurances offered by AMD’s microprocessors.…