There, they analyze and attack Intel's future generations of chips, looking for soft spots that can be hardened long before they reach your PC or MRI machine. About 20 iSTARE researchers now work in specially equipped labs in the northern Israeli city of Haifa and in the US. That's why five years ago Intel launched a dedicated hardware hacking group known as Intel Security Threat Analysis and Reverse Engineering. But if you're building processors that end up in millions of devices around the world, you can't afford to give up so easily. Allowing physical access to a device is often game over. Leave a computer unattended in a hotel and an attacker dressed as an employee could enter your room, plant malware on your laptop, and slip out without leaving a trace. "Evil maid" attacks are a classic cybersecurity problem.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |