The researcher says the device’s software stack exposes weak points from the moment it boots. Early units arrived with a pre-set password and open SSH access, a problem the researcher reported to Sipeed and which the company later corrected. The web interface still lacks basic protections, including CSRF defence and any mechanism to invalidate active sessions.
Tag: #hardware
High-performance mice can be used as a microphone to spy on users thanks to AI — Mic-E-Mouse technique harnesses mouse sensors, converts acoustic vibrations into speech | Tom’s Hardware
The processing works like this: the raw audio data is run through digital signal processing using a Wiener Filter, where you can start to hear some information. This is then further cleared up through a neural model, giving the researchers clear audio.
Apartment buildings broken into with phone in minutes — IoT-connected intercoms using default creds vulnerable to anyone with Google | Tom’s Hardware
A number of apartment complexes using internet-connected intercom/entry systems still use their default credentials, which make them fully accessible to anyone savvy enough to Google their unit’s manual.
‘You basically have to throw your computer away’: Researchers explain AMD ‘Sinkclose’ vulnerability, but do you need to worry? | Laptop Mag
The firmware vulnerability identified by Nissim and Okupski would allow hackers to run their own code in AMD’s System Management Mode, which is intended to run the processor’s firmware.
FTC warns PC manufacturers Asrock, Zotac, and Gigabyte that consumers have the right to repair | TechSpot
Manufacturers are also not shying away from engaging in outright illegal practices that the FTC has called out. For example, many companies still have warranties that are voided if anyone, except the company that made the product, has repaired it.
Intel issues advisories for 90 security vulnerabilities — includes critical level 10 for AI tools | Tom’s Hardware
https://www.tomshardware.com/tech-industry/cyber-security/intel-issues-advisories-for-90-security-vulnerabilities-includes-critical-level-10-for-ai-tools
The FBI’s honeypot Pixel 4a gets detailed in new report – Ars Technica
https://arstechnica.com/gadgets/2021/07/how-the-fbi-weaponized-android-modding-with-anom-devices/