Smart Home Devices Turn into ‘Life Spies’: How to Evict the ‘Invisible Guests’?

Smart Home Devices Turn into 'Life Spies': How to Evict the 'Invisible Guests'?

The smart vacuum cleaner in your home works right under your nose, while the ‘invisible guest’ watches you through its built-in camera… Recently, a smart vacuum cleaner from a South Korean brand was reported to have security vulnerabilities, allowing hackers to remotely control it and invade personal privacy.Click the audio to learn more! Originally intended … Read more

Safety Hazards in Industrial Control Systems: Common Logic Vulnerabilities in PLC Programs and Security Reinforcement Measures

Safety Hazards in Industrial Control Systems: Common Logic Vulnerabilities in PLC Programs and Security Reinforcement Measures

The safety issues in industrial control systems should not be underestimated. In my over ten years of maintenance experience with industrial control systems, I have found that many factory PLC programs have security vulnerabilities. These seemingly minor flaws can lead to equipment damage, production interruptions, and even safety accidents. Today, I will share common logic … Read more

Exploiting ARM Inter-Core Debugging Vulnerabilities to Gain Maximum SoC Hardware Privileges (Part 1)

Exploiting ARM Inter-Core Debugging Vulnerabilities to Gain Maximum SoC Hardware Privileges (Part 1)

Once thought that having root meant having the world Until I encountered it only then did I realize there is actually a brighter future (big mistake) Introduction Gaining root access to an operating system is generally considered the endpoint of penetration attacks. However, with the support of security solutions based on TEE (Trusted Execution Environment), … Read more

Embedded System Software Vulnerabilities and Security Isolation

Embedded System Software Vulnerabilities and Security Isolation

▲ Click Above to Follow STM32 In the past, developers often overlooked the security issues of embedded devices when discussing them, assuming that embedded devices are not easily susceptible to network attacks and are not targets for hackers, or that simply implementing encryption and authentication suffices for adequate security. However, in today’s world of the … Read more

Exploiting SATA Cables: How a Security Flaw Turns Hard Drive Cables into Antennas for Data Leakage

Exploiting SATA Cables: How a Security Flaw Turns Hard Drive Cables into Antennas for Data Leakage

The “SATAn” vulnerability turns SATA cables into antennas to defeat air gap security. Mordechai Guri at Ben-Gurion University seems to be in the death zone of air-physically isolated encrypted computers, or at least giving up their secrets. This hacker exploits a computer’s SATA cable as an antenna to leak data, another example of how many … Read more