More Speculative Execution Exploits – Meet Foreshadow / L1 Terminal Fault

Speculative execution is a feature to speed up performance of recent processors which works by predicting and loading likely future instructions ahead of time.  The features became somewhat famous a few months ago with Meltdown and Spectre vulnerabilities exploiting the features. The exploits impact Intel, AMD, Arm, and other processors to various degrees, and since the feature is built-in into the hardware, there’s no easy fix, and instead operating systems vendors, cloud service providers, hosting services and other stakeholders implemented mitigations. While a lot of progress has been made, work is still going on with the just released Linux 4.18 still getting some code changes related to the exploits. But just as solutions were found for Spectre and Meltdown, a new speculative execution exploitation has raised its ugly head: L1 Terminal Fault also known as Foreshadow.  The new flaw appears to be just as serious, and a dedicated website has […]

USB Charging Actually Poses Security Risks – Hacking a Laptop via a USB-C Adapter

Hacked USB type-C Charger

Smartphones have been charged over USB for many years, but with the advance of USB type-C now even laptops may be charged over USB, instead of the typical DC power barrel jack. Why am I writing about that? That’s because charging over a DC jack is normally safe, but after reading an article on BBC website, I’ve just realized when you charge over USB you also give access to the data connection, and security researcher (MG) has found a way to hack the USB-C charger of an Apple laptop and show a login prompt to steal credentials (username / password). The full details of the hack are no public, but it does require altering the hardware of the charger. So as long as you use the charger sold with your laptop, you should be safe. However, there’s always a risk if you charge from public places, or buy  a charger […]

Google Titan Security Key Prevents Phishing Attacks

Google Titan Security Key

Phising is a social engineering method that aims to trick users into giving their passwords. This can normally be mitigated with things called “brain” and “paying attention”, but since we are all humans mistakes may happen on a bad day. Even Google employees who should be tech savvy fell for the tricks from time-to-time, so Google made employees use 2-factor authentication with a  hardware security key since January 2017, and none of Google workers failed for a phising attack since then. CNET was provided with a sample of Google’s “Titan Security Key”, which comes in both USB and Bluetooth/NFC versions, and will be available for sale in Google’s online store within the next few months. The full technical details have not been provided for the key, but we do know Titan Security Keys support FIDO protocol, and are built with a secure element and a firmware written by Google that […]

Microchip Unveils SAM L10 & SAM L11 Arm Cortex-M23 MCU Families with Arm TrustZone for Armv8-M

SAM L10 Xplained Pro

Microchip has recently announced new SAM L10 and SAM L11 Arm Cortex-M23 MCU families, with the SAM L11 family featuring Arm TrustZone for Armv8-M that provides hardware isolation between certified libraries, IP and application code. SAM L10 & SAM L11 MCU Families Key features: Arm Cortex M23 Core @ 32 MHz Up to 64 KB Flash and 16 KB SRAM picoPower Technology less than 25 μA/MHz in active mode less than 100 nA in sleep mode Fast wakeup time: 1.5 μS Flexible power saving features Enhanced Peripheral Touch Controller (PTC) with improved water tolerance, noise immunity and responsiveness Security (for SAM L11 only) Chip-level tamper resistance Arm TrustZone technology Secure boot Secure bootloader Crypto accelerators Secure key storage Op amp ADC and DAC Package – VQFN32, TQFP32, WLCSP32, VQFN24, SSOP24 Microchip SAM L10 MCU achieved a ULPMark score of 405, or over 200 percent better performance compared to the nearest […]

WPA3 WiFi Security Formally Introduced, WiFi Easy Connect Allows Easier Setup of Headless Devices

WiFi Certified WPA3

While I still see some open WiFi access points from time to time in the wild, most people are using WPA2 authentication to connect securely to their own WiFi router, or public ones instead of WEP that has been found to be insecure many years ago. WPA2 is not quite secure as it once was, as last year WPA2-PSK was cracked. It’s not that bad, as it may still take several days with a strong password requiring a large password file for the hack to work. Still a new revision was needed, and the WiFi alliance has just introduced Wi-Fi WPA3 security. Just like with WPA2, there are personal and enterprise modes for WPA3 WPA3-Personal WPA2-Personal Pre-shared Key (PSK) is replaced with Simultaneous Authentication of Equals (SAE), which is said to be resistant to offline dictionary attacks where an adversary tries possible passwords without further network interaction. WPA3-Personal/SAE enables: Natural […]

Eufy EverCam Full HD Waterproof WiFi Security Camera Works for Up to a Year on a Single Battery Charge

Wired security cameras can be troublesome to installed due to the cabling required, but luckily there are solutions to avoid all those long cables with solar powered IP cameras, or battery powered IP cameras. A few years ago I wrote about Immedia Blink WiFi HD camera that claimed to last a year on a charge, and despite several complains on Kickstarter, they seem to still be in business.  There’s now a more advanced model by Eufy – an Anker brand – that supports 1080p video recording with motion sensing and face recognition, that also lasts up to one year on a charge, and offers free storage. Eufy EverCam specifications: Resolution – 1080p Video Format – H.264 High profile Image Sensor – Sony Exmor IMX323, 1/2 9-inch Field of View (FoV) – 140° Night Vision Range – up to 10 meters Digital Pan & Zoom  – Yes, up to 8x Motion […]

Alfawise JD-T8610-Q2 is Both a WiFi Light Bulb and 360° IP Camera

Alfawise-IP-Camera-Light-Bulb

IP cameras and WiFi light bulbs are pretty common nowadays, but Alfawise JD-T8610-W2 combines both in a single device. The 3W white light bulb can be controlled with your Android/iOS smartphone to adjust the light, and a 360° camera with IR night vision is also built into the light bulb. Specifications: Camera + audio 1.3MP fisheye lens camera with 360° field of view (FOV) Built-in microphone and speaker Video / Audio format – H.264/AVI 960×960 @ 20 fps + audio (no format specified) Functions Interphone Motion detection up to 4 meters Night vision via 3 IR LEDs up to 8 meters Real-time video capture and recording Remote control Screenshot Storage – micro SD card slot up to 64GB Connectivity 802.11 b/g/n WiFi with WEP, WPA, WPA2 encryption, 10 meters range Protocols: DHCP, TCP/IP, RTSP Light – 3x 1W white light Power Supply – 110-240V via E27 socket (5V DC internally) […]

FUZE Bluetooth Credit Card is Vulnerable to Hacking over Bluetooth

FUZE-Bluetooth-Credit-Card

FUZE Card is a Bluetooth enabled card with ePaper display that can store up to 30 real credit card. You’d program credit cards into it via Bluetooth Smart (BLE) using a smart phone app, and use it like a normal credit card while paying, after selecting the card you want to use. It’s more convenient than carrying many cards, and more secure since part of the number are hidden (shown as stars ****), so whoever get your card can’t easily make a copy of the information. A problem however is that according to ICE9 Consulting, there’s a security vulnerability that allows credit card numbers to be stolen via Bluetooth: CVE-2018-9119. The full details can be found on ICE9 blog post. They started to make a X-Ray to find out about the main components see (photo below), and the reverse-engineered the Bluetooth protocol using an Android smartphone, and software tools such as Burp […]

Exit mobile version
Memfault IoT and embedded debugging platform