Hardware attacks, a lingering threat for connected objects
Viruses, malware, spyware and other digital pathologies are not the only way computer systems’ vulnerabilities are exploited. Hardware attacks are not as well-known as these software attacks, but they are just as dangerous. They involve directly exploiting interaction with a system’s electronic components. These sneak attacks are particularly effective against connected objects. Jean-Max Dutertre’s team … Continue reading Hardware attacks, a lingering threat for connected objects
Copy and paste this URL into your WordPress site to embed
Copy and paste this code into your site to embed