#hardware-security

[ follow ]
Information security
fromTheregister
4 hours ago

Ruh-roh. DDR5 memory vulnerable to new Rowhammer attack

A Rowhammer variant called Phoenix can corrupt and expose data on SK Hynix DDR5 modules, bypassing current protections and posing practical security risks.
Gadgets
fromZDNET
2 weeks ago

10 pocket-sized tools that make life easier - and how I use each

A compact, customized keychain can store essential everyday tools and security devices, keeping them accessible without carrying a full toolbox.
fromTheregister
3 weeks ago

Microsoft shows off custom silicon keeping Azure on lockdown

A key aspect of Microsoft's hardware security is isolation. Encryption keys are stored in an integrated hardware security module (HSM), while VMs are isolated from one another using trusted execution environments (TEE) baked into modern CPUs and GPUs. The control, data, networking, and storage planes are all offloaded to smartNICs and an open source Root of Trust (RoT) module ensures everything is what it purports to be.
Information security
[ Load more ]