Reports of the death of cold-boot attacks have been greatly exaggerated. Cybersecurity wonks have long considered this a mostly solved problem, but new techniques have reanimated the decade-old ...
Part one of this pair of columns described “cold boot attacks” and their security implications, in particular for software-implemented full-disk encryption. Security expert Jurgen Pabel continues with ...
Until 2008, the consensus had been that there would be no practical way to remove a RAM chip from a computer system without losing all contained data. However, last July, researchers published a paper ...
Whenever I'm having a bad day with the operating system and think software is terrible I can always remember that firmware is usually worse and blindly trusted by what runs on top of it. OSes have ...
Recent research from Princeton, McGraw Security Services illustrates how the lack of encryption specifications in legislation could put consumer data at risk. Last winter, researchers at Princeton ...
SRAM security concerns are intensifying as a combination of new and existing techniques allow hackers to tap into data for longer periods of time after a device is powered down. This is particularly ...
It's funny how the demands of FOSS lovers are labelled unreasonable, yet every time they are proven to be right, with every product they criticize. Open firmware would make changing this a trivial (or ...