➀ Google's Pixel smartphones are known for their security due to constant Android updates; ➁ Researchers are finding that many devices lack exploit mitigations for their cellular basebands; ➂ Google is focusing on hardening its software with features like Bounds Sanitizer and Control Flow Integrity to protect Pixel users.
Recent #security news in the semiconductor industry
➀ Crypto Quantique has collaborated with ADLINK Technology to simplify secure boot for industrial PCs using its QuarkLink security platform; ➁ The integration of QuarkLink into ADLINK IPCs provides benefits for product lifecycle management and secure cryptographic key storage; ➂ The platform supports secure over-the-air updates and device attestation, ensuring device security throughout their operational lifetime.
➀ Microsoft is preparing to reintroduce the Recall feature with enhanced security measures; ➁ The feature will be opt-in by default and offer users control over their data; ➂ Microsoft has addressed security and privacy concerns by implementing encryption and user control settings.
➀ Sentienz's Akiro IoT platform addresses challenges in e-transportation with advanced analytics and MQTT+; ➁ Akiro optimises IoT outcomes through messaging, analytics, and AI/ML; ➂ The platform supports smart meters, EV chargers, and battery monitoring systems, enhancing EV charging infrastructure and data management.
➀ Avnet Silica outlines its strategy for supporting customers’ compliance with the EU’s Cyber Resilience Act (CRA); ➁ The company provides a range of device management and provisioning services; ➂ Avnet Silica is leading a series of workshops across Europe to cover compliance issues.
1. North Korean hacker group impersonates legitimate cryptocurrency exchange (DEX) company representatives on LinkedIn to gain access to the accounts of crypto and finance professionals. 2. Hackers engage in ongoing communication with the professionals and request them to execute specific code for coding tasks and testing purposes. 3. The malware installation allows cyber attackers to access company networks or systems for information theft or system attacks.
➀ Google is enhancing Chrome's security features with the latest update; ➁ An improved Safety Check will run in the background to protect users; ➂ Users can now stop unwanted notifications and grant one-time permissions to websites.
➀ South Korea's ETRI develops an AI monitoring system named Dejaview; ➁ The system uses CCTV footage and other data to predict crime; ➂ Dejaview has an 82.8% accuracy rate in predicting felonies;
➀ The Zen 5 architecture is immune to the Inception vulnerability; ➁ No performance regressions from Inception mitigation on Zen 5; ➂ Zen 3 and Zen 4 require software mitigations for Inception.
➀ Crypto Quantique introduces TuRiNG, a randomness test suite for PUFs, addressing NIST 800-22 limitations. ➁ The suite adapts existing tests to PUF characteristics, ensuring independence of outputs and cryptographic security. ➂ It introduces innovative techniques to efficiently validate PUF randomness, enhancing security in IoT devices.
➀ Chinese-made chips in RFID cards contain hardware backdoors that are easily exploitable. ➁ These chips are compatible with the Mifare protocol and are inherently insecure. ➂ Security researchers at Quarkslab discovered a backdoor in RFID cards by Shanghai Fudan Microelectronics, which could be used to clone cards quickly.
1. Researchers at Cado Security have identified a new malware named 'Cthulhu Stealer' targeting macOS users, disguising as legitimate software like CleanMyMac and Grand Theft Auto IV. 2. The malware, similar to Atomic Stealer, attempts to steal passwords, credentials, cryptocurrency wallets, and game account data. 3. Users are advised to download software only from the Apple App Store or official vendor websites to avoid potential malware threats.
1. Ring introduces a new $99.99 Battery Doorbell with 'Head-to-Toe HD' video recording, offering a 66% taller view and color night vision. 2. The doorbell features a push-pin mount design for easier installation and claims to have up to 23% longer battery life. 3. The new model is available for preorder and will release on September 4, 2024.
➀ Introduces the CC2560A, the world's first RISC-V core super SIM chip, designed for multi-interface, high-security, and large-capacity smart card applications. ➁ Features a 32-bit RISC-V embedded security processor with a 120MHz clock speed, significantly enhancing transmission rates and computational power. ➂ Emphasizes advanced security measures including hardware-level encryption, EAL5+ certification, and support for international and national cryptographic algorithms.
➀ ZeroEyes introduces ZeroEyes One (ZEO), an AI-powered gun detection solution for small businesses and private residences. ➁ ZEO can be deployed on existing digital IP cameras and is designed to enhance security and protect against gun-related violence. ➂ The solution includes a 24/7/365 operations center staffed by military and law enforcement veterans to verify threats and alert local authorities.
1. A critical zero-click security flaw in all versions of Windows allows for wormable remote code execution; 2. Microsoft has assigned a severity score of 9.8/10 to CVE-2024-38063; 3. The vulnerability was discovered by Chinese researcher Xiao Wei and has been patched by Microsoft, along with other zero-day vulnerabilities.
1. An app called Showcase.apk, designed for Verizon in-store demos, has left multiple generations of Pixel smartphones vulnerable to various attacks since 2017. 2. The app, pre-installed in Pixel firmware, allows potential attackers to execute code or shell commands with system privileges, posing significant security risks. 3. Google is committed to removing the app from all affected devices, but a patch for the vulnerability is yet to be released.
➀ Microchip Technology has expanded its TrustFlex secure key provisioning service with three new ICs. ➁ These ICs are designed for secure storage and are used alongside microcontrollers or microprocessors to protect secret keys from hacking. ➂ The new devices are part of the TrustFlex platform, which includes pre-configured use cases and customizable cryptographic keys.
➀ AMD has announced that it will not patch all chips affected by the 'Sinkclose' vulnerability, including Ryzen 3000, 2000, and 1000 series. ➁ Most recent AMD processors have received mitigation options, but older models like Ryzen 3000 and older, and Threadripper 2000 and older, are not included. ➂ All Ryzen Embedded and EPYC Embedded systems will receive an update to patch the vulnerability.
1. Samsung is addressing a major security vulnerability affecting millions of Galaxy devices, originally thought to be limited to Google's Pixel devices. 2. The vulnerability, CVE-2024-32896, is an elevation of privilege flaw, and Samsung aims to release a fix by August. 3. The update rollout may vary depending on network providers and device models.