Embedded System Software Vulnerabilities and Security Isolation

Embedded System Software Vulnerabilities and Security Isolation

▲ Click Above to Follow STM32 In the past, developers often overlooked the security issues of embedded devices when discussing them, assuming that embedded devices are not easily susceptible to network attacks and are not targets for hackers, or that simply implementing encryption and authentication suffices for adequate security. However, in today’s world of the … Read more

Exploiting SATA Cables: How a Security Flaw Turns Hard Drive Cables into Antennas for Data Leakage

Exploiting SATA Cables: How a Security Flaw Turns Hard Drive Cables into Antennas for Data Leakage

The “SATAn” vulnerability turns SATA cables into antennas to defeat air gap security. Mordechai Guri at Ben-Gurion University seems to be in the death zone of air-physically isolated encrypted computers, or at least giving up their secrets. This hacker exploits a computer’s SATA cable as an antenna to leak data, another example of how many … Read more