News

Hardware Trojans a Reality

September 23, 2013  Security Suite

Cryptographic capabilities of microprocessors can be sabotaged without detection with secret backdoors built into the hardware. Scientists recently proved this covert technique by devising two hardware backdoors for an attack on Intel®. The company’s Ivy Bridge processors were compromised by altering instructions to its random number generator (RNG), which went undetected by the computer’s Built-In Self-Tests mandated by the National Institute of Standards and Technology for compliance certifications. These hardware trojans could be deliberately built into integrated circuits for exploitation.

Back to News Archive

News of the Month

Stagefright - probably the most dangerous threat to smartphones right now

August 25, 2015  Security Suite

Can you imagine a single received MMS could allow hackers to access all your data on your phone? Meet Stagegright, the exploit that is a threat for 950 million smartphones with Android. Vulnerability like this is very dangerous because it does not require any action by the victim - all the hacker needs to compromise your smarthphone is your phone number.

Ayuda del Producto

Ve a nuestra Sección de Ayuda ahí encontrara soluciones rápidas a los problemas que pueda tener con nuestros productos.

Full IT Glossary

Busque términos técnicos en nuestro amplio glosario! Use esto como una herramienta de referencia y lectura informativa, con definiciones fáciles de entender.

Visite el Glosario de Tecnología

En el punto de mira

Spyware Terminator 2015

Efectivamente elimine Spyware de su PC

Más información