Topic: hardware security
-
Rethinking Cybersecurity from the Silicon Up
Traditional reactive cybersecurity, focused on software patches and detection, is insufficient against modern threats that target deeper hardware and firmware layers. A Hardware Root of Trust (HRoT) embedded in silicon provides a proactive, tamper-resistant foundation by actively validating hardw...
Read More » -
Riot Games Uncovers Motherboard Flaw Exploited by PC Cheaters
A critical security vulnerability in modern motherboards, exposed by Riot Games, allowed cheaters to bypass anti-cheat systems by exploiting Direct Memory Access hardware during system startup. Major hardware manufacturers have issued critical BIOS updates to fix the flaw, which Riot's Vanguard a...
Read More » -
NTT DATA and Fortanix Partner to Boost AI and Quantum Security
NTT DATA and Fortanix have launched a Cryptography-as-a-Service solution that combines advanced data security with AI expertise to protect sensitive information across hybrid and multicloud infrastructures against current and future quantum threats. The service emphasizes crypto-agility, enabling...
Read More » -
Top Black Friday 2025 Cybersecurity Deals to Secure
Black Friday 2025 offers significant discounts on cybersecurity tools, making enterprise-grade protection more affordable for businesses to secure their systems and data. Featured products include Passwork for password management, NordLayer for network security, NordPass for credential management...
Read More » -
AI SSD Subscription Fights Ransomware at Hardware Level
Flexxon has launched the X-Phy Guard Solution, an AI-integrated SSD designed as a final defense against cyberattacks like ransomware, targeting high-security sectors with a subscription starting at $249 annually. The drive's AI engine monitors for threats such as encryption patterns and physical ...
Read More » -
Bluesky's 'Privacy-First' Contact Import: Here's How It Works
Bluesky's "Find Friends" feature prioritizes privacy by requiring mutual consent and active participation from both users for a match to occur. The system uses phone number verification and cryptographic hashing to protect contact data, preventing unauthorized access or probing. Users maintain fu...
Read More »