We look at a warning Nintendo has released, steering consumers away from imitation websites selling potentially dubious hardware.
Malware and hardware problems can look surprisingly similar. So what do you do when your virus scan draws a blank?
We look at how successful hardware hacks can damage devices—and potentially even put lives at risk.
In part two of our blog assessing the security of a portable router, we will acquire the tools and equipment to make a copy of the firmware on our target router so that we can assess whether there are any vulnerabilities.
Attention makers! Are you looking for a challenging project that not only gets your gears grinding but helps to keep you secure while traveling? Welcome to the build-your-own security camera tutorial.
A potentially erroneous report from Bloomberg claimed that Chinese spies were able to infiltrate US hardware supplier Supermicro, and therefore, our technology supply chain. Learn how this unverified story could ultimately come true—and what, if anything, can be done to stop it.
In this post, we acquire the necessary equipment to analyze the security of an inexpensive portable router, which we access through its diagnostic interface, and poke around inside.