
Phoenix: a Rowhammer attack vs. DDR5 memory
Phoenix, a new variant of the Rowhammer attack, makes it possible to attack DDR5 memory modules.
8 articles
Phoenix, a new variant of the Rowhammer attack, makes it possible to attack DDR5 memory modules.
New research demonstrates for the first time how hardware vulnerabilities in modern CPUs can be exploited in practice.
A Chaos Communication Congress speaker reflects on whether using open-source hardware can solve trust problems in hardware.
Trojanized HID devices as well as surveilling or malicious cables are serious threats that can be used to compromise even air-gapped systems.
Meltdown and Spectre: the two vulnerabilities that threaten every device on Intel, AMD or ARM processors
With accessible network cables and a lack of authentication between the ATM and the bank’s infrastructure, ATMs are far too easy to attack.
Any USB device can potentially be zombified and turned into a secret agent for cybercrooks. The world needed a shield against this threat, so we rolled up our sleeves and created one.
A virus damaging hardware is one of the most widely believed myths in the infosec domain. And, at the same time, it’s the most non-standard one. And it’s not totally a myth, after all.