A zero-day vulnerability in Western Digital My Book Live NAS devices allowed a threat actor to perform mass-factory resets of devices last week, leading to data loss. […]Read More Hackers use zero-day to mass-wipe My Book Live devices
An open-source application called WhyNotWin11 acts as a better drop-in replacement for Microsoft’s PC Health Check app to determine if your hardware is compatible with Windows 11. […]Read More WhyNotWin11 is a better replacement for Windows 11’s PC Health Check
Microsoft has announced the hardware requirements for Windows 11 needed to properly install the operating system and get access to early preview builds. […]Read More Microsoft publishes the Windows 11 system requirements
IDC recently published new forecasts for the worldwide hard disk drive (HDD) and solid state drive (SSD) market. While both markets were affected by the COVID-19 pandemic, the outlook looks good as demand for storage remains strong in multiple areas. W…Read More Worldwide HDD and SSD market growth shows strong demand for data storage
In the digital world, cryptographic solutions use encryption keys to secure data at rest, data in use, and data in transit. They are responsible for encrypting and decrypting the data, validating identities by authenticating users and devices, and secu…Read More Are your cryptographic keys truly safe? Root of Trust redefined for the cloud era
NVIDIA is dropping support for Windows 7, Windows 8, and Windows 8.1 drivers starting in October. 2021, as they focus on supporting Windows 10 and later versions of Windows. […]Read More NVIDIA is dropping support for Windows 7 and Windows 8 drivers
There’s new research that demonstrates security vulnerabilities in all of the AMD and Intel chips with micro-op caches, including the ones that were specifically engineered to be resistant to the Spectre/Meltdown attacks of three years ago.
Read More New Spectre-Like Attacks
The new line of attacks exploits the micro-op cache: an on-chip structure that speeds up computing by storing simple commands and allowing the processor to fetch them quickly and early in the speculative execution process, as the team explains in a writeup from the University of Virginia. Even though the processor quickly realizes its mistake and does a U-turn to go down the right path, attackers can get at the private data while the processor is still heading in the wrong direction…
Apple’s all-in on its homebrew M1 chips. It’s now inside iMacs and iPad Pros.Read More New Apple iMac and iPad Pros now use the M1 chip
The debate within business organizations of whether to use consumer devices or to invest in rugged devices for the operations side of their business is as old as personal computing itself. And with the pandemic having shown that endpoint management is …Read More Why enterprises need rugged devices with integrated endpoint management systems
This report is six months old, and I don’t know anything about the organization that produced it, but it has some alarming data about router security.
Read More Router Security
Conclusion: Our analysis showed that Linux is the most used OS running on more than 90% of the devices. However, many routers are powered by very old versions of Linux. Most devices are still powered with a 2.6 Linux kernel, which is no longer maintained for many years. This leads to a high number of critical and high severity CVEs affecting these devices.
Since Linux is the most used OS, exploit mitigation techniques could be enabled very easily. Anyhow, they are used quite rarely by most vendors except the NX feature…
NVIDIA is purposely crippling the Ethereum mining power of their upcoming GeForce RTX 3060 GPU by 50% to increase inventory for gamers. […]Read More Upcoming NVIDIA RTX 3060 purposely cripples mining performance