September 29, 2017
Google's Project Zero released a proof-of-concept iOS exploit similar to the Broadpwn Wi-Fi flaw that could allow an attacker to run code or implant a backdoor.
August 21, 2017
Experts and Apple say despite the leak of the iPhone Secure Enclave Processor encryption key that can be used to decrypt firmware code, user data and biometric information are still safe.
July 26, 2017
Long a conference that has thrived on technical sophistication and nuanced attacks, Black Hat USA 2017 in Las Vegas also found room for softer themes.
June 22, 2017
The latest threat to server security could be the firmware. That's the emphasis of at least one server-maker, hoping to help users thwart new attacks -- and spark server demand.
Firmware Get Started
Bring yourself up to speed with our introductory content
Sachin Kurlekar of Persistent Systems guides manufacturers through the IoT journey, from the specification phase to the support and upgrade phase Continue Reading
These best design practices will help developers maximize the ability to update configurations or add new functionality after IoT devices leave the factory. Continue Reading
BadBIOS is a BIOS-level Trojan that can affect Windows, Macintosh, Linux and BSD systems. The BIOS (Basic Input / Output System) is the firmware that runs while a computer boots up. A BIOS attack infects the BIOS with malicious code and is persistent through reboots and attempts to reflash the firmware. Continue Reading
Evaluate Firmware Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The key to securing internet of things systems lies in focusing on the silicon, says Art Swift, president of prpl foundation. Continue Reading
As hackers continue to use more sophisticated tools to execute cyberattacks, there are six steps IT can take to prevent hospital ransomware infections and other cyberthreats. Continue Reading
MouseJack, a wireless mouse and keyboard security flaw, allows attackers to type malicious commands. Expert Nick Lewis explains how enterprises can prevent these attacks. Continue Reading
Learn to apply best practices and optimize your operations.
VMware patches, due to interconnections with the rest of your system, require as much coordination as firmware upgrades. Balance update scheduling carefully to maintain control. Continue Reading
When I saw my Surface Pro 3 got firmware updates a month ahead of general release I was puzzled. Then I remembered that PC is on the "Release Preview" update cycle. Continue Reading
Many IT shops are considering 2-in-1s to replace PCs. With the addition of UEFI, Microsoft puts the Surface Pro 4 into that conversation. Continue Reading
Problem Solve Firmware Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Hackers could take advantage of a physical Amazon Echo vulnerability to turn the Echo into a listening device. Judith Myerson explains how this works and what can be done about it. Continue Reading
Smartphone users could be at risk of memory corruption attacks because of a baseband vulnerability. Expert Michael Cobb explains the attack and how concerned users should be. Continue Reading
A vulnerability in Intel AMT enables attackers to gain remote access to PCs and devices. Expert Judith Myerson explains how the attack works and what can be done to prevent it. Continue Reading