Thin Client Customization

The Raspberry Pi is a single computer board, developed for Internet of Things (IoT) projects. The low cost, numerous connectivity options, and 'plug and play' nature of Pi makes for a board that is ideal for all. Pi is the perfect tool; you can use it as a desktop computer, media center, server, monitoring/security device, or any other custom application. We can compile any Linux-based Operating System (OS) to run on the versatile Raspberry Pi. Unlock the potential of the Raspberry Pi with plenty of access to development software and configuration options.

Millions of Peripherals Open to Cyberattacks

Firmware can be burned into the integrated circuit or the component may have its own flash memory where firmware is stored. Firmware can also be provided by the operating system at boot time. Regardless of the approach, firmware is used as the device-specific operating system for the peripherals, and can provide hackers many ways to hack into a system. Many peripheral devices do not verify that firmware is properly signed with a public/private key before running the code. ...

Intel Patches Flaw in Security Engine

It's not the first flaw found in CSME. In November, a critical flaw in CSME was patched that could allow escalation of privilege, denial of service or information disclosure. Another critical flaw discovered in May could allow an authenticated user to enable escalation of privilege over network access in CSME. ...

Google Chrome Will Block File Downloads

Google started to label HTTP websites with an "insecure" warning in the navigation bar from Chrome 68. Just because websites use an HTTPS connection does not guarantee that they are safe from all threats. Phishing landing pages can easily use SSL certificates. Similarly, HTTPS websites can still serve up images, scripts or other file types that are downloaded using the less-secure HTTP connection. ...

Microsoft Patches Crypto Spoofing Flaw

he vulnerability, CVE-2020-0601, exists in the way Windows Crypt32.dll validates Elliptic Curve Cryptography certificates. Core CryptoAPI functions include encrypting and decrypting data using digital certificates. The CryptSignMessage function creates a hash of the specified content, signs the hash, and then encodes both the original message content and the signed hash. On unlatched systems, hackers can evade next-ge ...