A number of apartment complexes using internet-connected intercom/entry systems still use their default credentials, which make them fully accessible to anyone savvy enough to Google their unit’s manual.
Tag: #hardware
‘You basically have to throw your computer away’: Researchers explain AMD ‘Sinkclose’ vulnerability, but do you need to worry? | Laptop Mag
The firmware vulnerability identified by Nissim and Okupski would allow hackers to run their own code in AMD’s System Management Mode, which is intended to run the processor’s firmware.
FTC warns PC manufacturers Asrock, Zotac, and Gigabyte that consumers have the right to repair | TechSpot
Manufacturers are also not shying away from engaging in outright illegal practices that the FTC has called out. For example, many companies still have warranties that are voided if anyone, except the company that made the product, has repaired it.
Intel issues advisories for 90 security vulnerabilities — includes critical level 10 for AI tools | Tom’s Hardware
https://www.tomshardware.com/tech-industry/cyber-security/intel-issues-advisories-for-90-security-vulnerabilities-includes-critical-level-10-for-ai-tools
The FBI’s honeypot Pixel 4a gets detailed in new report – Ars Technica
https://arstechnica.com/gadgets/2021/07/how-the-fbi-weaponized-android-modding-with-anom-devices/
What is a TPM? And here’s why you need it for Windows 11 | Tom’s Guide
https://www.tomsguide.com/news/what-is-a-tpm-and-heres-why-you-need-it-for-windows-11
Scientists strapped a tiny camera to a beetle to test just how small video technology can get – CNN
https://www.cnn.com/2020/07/15/us/beetle-tiny-cameras-scli-scn-intl/index.html
Re-Purposing old Computers
A short list of uses for old computers … Home Media Server File Server Print Server Streaming Machine MP3 Jukebox Dedicate it to Research Use it for personal cloud storage…