Security


Intel's New Vulnerability: Unraveling the Side-Channel Attack Threat

Recently, new side-channel attacks have been identified in multiple Intel processors where data can be leaked through the EFLAGS register. What is a side-channel attack, how does the vulnerability work, and what challenges does this pose to engineers? What are...

By Robin Mitchell | 05-05-2023

Can Biofire's Biometric Smart Gun Prevent Unauthorised Use of Firearms?

Recently, a Colorado-based company, Biofire, has been developing a Smart Gun that utilises biometrics to allow only authorised users to discharge the weapon. This article explores the challenges firearms face concerning safety, how Biofire plans to use biometr...

By Robin Mitchell | 03-05-2023

China's Cyber Threat: How Germany Is Securing Its 5G Network

As China continues to escalate tensions with Taiwan, countries around the world are evaluating their infrastructure for safety against potential Chinese cyberattacks, and now Germany is addressing security risks in its 5G network by investigating Chinese compo...

By Robin Mitchell | 18-04-2023

Samsung Fab Data Leak: How ChatGPT Exposed Sensitive Information

Recently, employees from Samsung Fab had been permitted to use ChatGPT, an increasingly popular AI model with numerous capabilities yet certain limitations, to aid in work tasks like coding, notes, and explanations, but over the course of 20 days, three occasi...

By Robin Mitchell | 12-04-2023

Ultrasound Hacks: The Hidden Dangers of Voice-Controlled Devices

Researchers recently demonstrated how hackers can exploit Near-Ultrasound Inaudible Trojan (NUIT) to send inaudible ultrasound commands to voice-controlled systems like Alexa and Siri, raising concerns over privacy, surveillance, and data breaches involving pe...

By Robin Mitchell | 30-03-2023

Is it Only Chinese-made CCTV Equipment That Poses a Security Risk?

Chinese surveillance companies Hikvision and Dahua have the lion’s share of the UK CCTV market, with over 66% of public buildings using their cameras, and that includes security-sensitive government offices. In addition to that, a majority of higher education...

By Paul Whytock | 21-03-2023

Why Open-Source Projects Need to Address Dependency-related Security Risks

Open-source software and hardware projects are becoming increasingly popular, but their complexity and large supply chains bring new challenges for engineers in terms of cybersecurity. With the growing threat of cyber attacks, it's important to understand the...

By Robin Mitchell | 13-02-2023

Chinese Weather Balloon? Not Likely!

With the media in a frenzy over Chinese balloons drifting across the US, it would seem that tensions between the US and China are at an all-time high now that the US military has shot the balloon down. What exactly has happened with this balloon, what technica...

By Robin Mitchell | 09-02-2023

UK Government to Install State-of-the-Art Anti-Drone Systems to Prevent Attacks

In a recent but low-key announcement, the UK Government has taken a proactive step towards defending against the potential threat posed by drones. The government has declared its intention to install advanced anti-drone systems throughout the country to protec...

By Robin Mitchell | 01-02-2023

Wi-Fi Pose Detection: Researchers Show How the Media Got it Wrong

Recently, researchers demonstrated how Wi-Fi and advanced imaging technology, using scientific and engineering principles, can detect people in a room and determine their pose, but media reports, despite facts and logic, falsely claim it can "see through walls...

By Robin Mitchell | 26-01-2023

The Importance of Cybersecurity: FBI No Fly List Leaked on Unsecure Server

Recently, a Swedish hacker discovered a No Fly List used by the FBI to ban suspect individuals from flying, but this data, complete with passport numbers, birth dates, and other private information, was left on an unsecured server. It's alarming to think that...

By Robin Mitchell | 26-01-2023

Investigation Reveals the Presence of Secret Devices in Government Vehicles

Recently, hidden Chinese devices have been found inside vehicles used by the government, which continues to demonstrate the dangers posed by foreign manufacturing. What challenges does Chinese hardware present, what exactly was found, and what does this mean f...

By Robin Mitchell | 18-01-2023

Spintronics: Logic Lock Circuits Could Become Critical in Future Electronics

The importance of hardware security has been a topic of increasing concern for researchers. A recent paper published by a group of researchers discusses the use of spintronics in creating digital logic locking circuits that can only be activated with the corre...

By Robin Mitchell | 03-01-2023

The Brilliance of TikTok: Mass Surveillance & Control

While younger generations continue to absorb social media platforms such as TikTok, government officials in South Dakota have announced a ban on TikTok from all government devices due to security fears. Why is TikTok a stroke of genius on China's part, what se...

By Robin Mitchell | 20-12-2022