#firmware-4467

[ follow ]
#intel
Tech industry
from24/7 Wall St.
20 hours ago

Intel's Panther Lake Chip is Seriously Impressive. It's Time to Buy the Stock

Intel's stock has surged nearly 130% under CEO Lip-Bu Tan, signaling a potential comeback in the chip industry.
Tech industry
from24/7 Wall St.
20 hours ago

Intel's Panther Lake Chip is Seriously Impressive. It's Time to Buy the Stock

Intel's stock has surged nearly 130% under CEO Lip-Bu Tan, signaling a potential comeback in the chip industry.
#cisco
fromSecurityWeek
2 days ago
Information security

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has released fixes for two critical and six high-severity vulnerabilities affecting various enterprise networking products.
Information security
fromSecurityWeek
2 days ago

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has released fixes for two critical and six high-severity vulnerabilities affecting various enterprise networking products.
#raspberry-pi
fromZDNET
2 months ago
Gadgets

This new Raspberry Pi accessory is a must-have for your multi-OS and data-hungry projects

Business
fromTheregister
4 days ago

Raspberry Pi leans into semiconductors as sales climb

Raspberry Pi reported significant revenue and profit growth, but its focus is shifting from hobbyist origins to broader industrial applications.
fromZDNET
2 months ago
Gadgets

This new Raspberry Pi accessory is a must-have for your multi-OS and data-hungry projects

Science
fromNature
6 days ago

Inside the 'self-driving' lab revolution

Eve, an AI-powered robotic platform, automates early-stage drug design, significantly enhancing efficiency in scientific research.
Gadgets
fromTheregister
1 week ago

Engineer sabotaged PC then complained when it didn't work

Ewen faced challenges with a fiber-optic device that produced faulty data, leading to a long drive to troubleshoot the issue.
DevOps
fromTechzine Global
1 week ago

Broadcom ships VKS 3.6 and moves Velero to CNCF Sandbox

Broadcom announced VMware vSphere Kubernetes Service 3.6 and submitted Velero to the CNCF Sandbox, enhancing Kubernetes support and operational efficiency.
#cybersecurity
Privacy professionals
fromWIRED
2 weeks ago

Cyberattack on a Car Breathalyzer Firm Leaves Drivers Stuck

Law enforcement dismantled major botnets while new vulnerabilities and privacy issues in tech continue to emerge, raising concerns over security.
fromMail Online
2 weeks ago
Information security

FBI exposes three signs your smart devices have been secretly hijacked

Cybercriminals can hijack smart devices, leading to increased data usage and internet charges, while turning devices into part of a botnet.
Privacy professionals
fromWIRED
2 weeks ago

Cyberattack on a Car Breathalyzer Firm Leaves Drivers Stuck

Law enforcement dismantled major botnets while new vulnerabilities and privacy issues in tech continue to emerge, raising concerns over security.
Information security
fromMail Online
2 weeks ago

FBI exposes three signs your smart devices have been secretly hijacked

Cybercriminals can hijack smart devices, leading to increased data usage and internet charges, while turning devices into part of a botnet.
fromBleepingComputer
5 days ago

New RoadK1ll WebSocket implant used to pivot on breached networks

"Its sole function is to convert a single compromised machine into a controllable relay point, an access amplifier, through which an operator can pivot to internal systems, services, and network segments that would otherwise be unreachable from outside the perimeter."
Information security
fromTechCrunch
1 week ago

Arm is releasing its first in-house chip in its 35-year history | TechCrunch

Arm Holdings has revealed the Arm AGI CPU, a production-ready chip built for running inference in an AI data center, marking a significant shift in its business model.
Tech industry
#flipper-zero
Gadgets
fromZDNET
1 week ago

The Flipper One looks like a serious hacking tool, and I can't wait to try it - here's why

The Flipper Zero is an educational digital tool for hacking and exploring wireless technologies.
fromZDNET
2 months ago
Gadgets

7 cool and useful things I can do with my Flipper Zero - as someone who's used it for years

Gadgets
fromZDNET
1 week ago

The Flipper One looks like a serious hacking tool, and I can't wait to try it - here's why

The Flipper Zero is an educational digital tool for hacking and exploring wireless technologies.
fromZDNET
2 months ago
Gadgets

7 cool and useful things I can do with my Flipper Zero - as someone who's used it for years

Tech industry
fromWIRED
1 week ago

Arm Is Now Making Its Own Chips

Arm is producing its own semiconductors, marking a shift from licensing to manufacturing in response to AI demand.
Software development
fromTheregister
2 weeks ago

Linux Foundation wants to shield FOSS devs from AI bug slop

Six major tech companies are funding a $12.5 million Linux Foundation initiative to help open source maintainers manage the surge of AI-generated vulnerability reports.
Roam Research
fromArs Technica
3 weeks ago

14,000 routers are infected by malware that's highly resistant to takedowns

A 14,000-device botnet called KadNap primarily compromises unpatched Asus routers to create a takedown-resistant proxy network for cybercrime using peer-to-peer Kademlia architecture.
Web frameworks
fromMedium
3 weeks ago

My 8-Year-Old Open-Source Project was a Victim of a Major Cyber Attack

A popular open-source project fell victim to a supply-chain attack through a development workflow loophole, threatening years of work and project reputation.
#tp-link
Information security
fromTechRepublic
1 week ago

TP-Link Fixes Bug That Lets Hackers Take Over Routers Without a Password

TP-Link patched critical vulnerabilities in Archer NX routers that allowed unauthorized firmware installation and network manipulation.
fromTheregister
1 week ago

Microsoft cracks down on old Windows kernel drivers

Microsoft is removing trust for kernel drivers that haven't been through the Windows Hardware Compatibility Program, targeting those signed by the long-deprecated cross-signed root program. This change will take effect with the April 2026 Windows Update.
Information security
Tech industry
fromTheregister
2 weeks ago

Your next car night need 300GB of RAM, and so will robots

Micron Technology projects sustained growth driven by AI demand, with autonomous vehicles and humanoid robots requiring 300+ gigabytes of DRAM, while the company tripled revenue year-over-year to $23.86 billion in Q2 2026.
#ai-security
Artificial intelligence
fromZDNET
3 weeks ago

AI is getting scary good at finding hidden software bugs - even in decades-old code

AI models can effectively identify decades-old bugs in legacy code, but this capability also enables hackers to exploit vulnerabilities in deployed systems.
fromTechzine Global
2 weeks ago
Information security

Harness secures AI code and AI apps with two new modules

Harness launches AI Security and Secure AI Coding modules to detect, test, and protect AI components throughout the application lifecycle while scanning AI-generated code for vulnerabilities in real time.
Artificial intelligence
fromZDNET
3 weeks ago

AI is getting scary good at finding hidden software bugs - even in decades-old code

AI models can effectively identify decades-old bugs in legacy code, but this capability also enables hackers to exploit vulnerabilities in deployed systems.
Information security
fromTechzine Global
2 weeks ago

Harness secures AI code and AI apps with two new modules

Harness launches AI Security and Secure AI Coding modules to detect, test, and protect AI components throughout the application lifecycle while scanning AI-generated code for vulnerabilities in real time.
fromYanko Design - Modern Industrial Design News
3 weeks ago

This Foldable DIY Cyberdeck Has Breadboards Built In and Runs Doom - Yanko Design

What separates this from a standard Raspberry Pi build is the pair of breadboards soldered directly to the GPIO pins, seated inside the case, and accessible through a removable back panel. Connecting a sensor no longer means hunting for a separate breadboard and a tangle of jumper wires. PickentCode plugged in a temperature and humidity sensor and had it reading live data within minutes.
Gadgets
Privacy technologies
fromSecurityWeek
1 month ago

Researchers Uncover Method to Track Cars via Tire Sensors

TPMS tire pressure sensors transmit unencrypted unique identifiers allowing low-cost roadside receivers to track vehicle movements and driving patterns.
#edge-ai
Artificial intelligence
fromEngadget
3 weeks ago

Qualcomm's new Arduino Ventuno Q is an AI-focused computer designed for robotics

Qualcomm's Arduino Ventuno Q combines a Dragonwing IQ8 processor with a microcontroller and 16GB RAM for AI-powered robotics and edge computing applications.
Artificial intelligence
fromEngadget
3 weeks ago

Qualcomm's new Arduino Ventuno Q is an AI-focused computer designed for robotics

Qualcomm's Arduino Ventuno Q combines a Dragonwing IQ8 processor with a microcontroller and 16GB RAM for AI-powered robotics and edge computing applications.
Software development
fromInfoWorld
3 weeks ago

Coding for agents

AI agents reward explicit, consistent, well-documented code over clever or personally-preferred approaches, fundamentally changing software engineering standards toward machine-legibility.
Gadgets
fromTheregister
3 weeks ago

Intel finds its Zen undercutting AMD with Arrow Lake refresh

Intel's Core Ultra 200S Plus lineup offers up to 24 cores for under $300, directly competing with AMD's pricing by delivering more cores per dollar to regain market share.
Software development
fromFuturism
4 weeks ago

Entirely Vibe-Coded Operating System Is a Bug-Filled Disaster

Vibe-coded software development produces non-functional results, as demonstrated by Vib-OS, an entirely AI-generated operating system that is buggy and largely unusable despite claimed features.
fromZDNET
3 weeks ago

Firewalla Orange review: This router gave my home network a meaningful security upgrade

I see a lot of people referring to Firewalla hardware as a firewall or security tool, and while that's correct, it also offers so much more. Think of the tech as having your very own personal network administrator, making even complex networking tasks as simple as flicking a virtual switch.
Gadgets
#smart-home-security
fromZDNET
1 month ago
Privacy technologies

Your smart home may be at risk - 6 ways experts protect your devices from attacks

fromZDNET
2 months ago
Privacy technologies

Should you be afraid of smart home hacking? What it is, and how experts prevent it

fromZDNET
1 month ago
Privacy technologies

Your smart home may be at risk - 6 ways experts protect your devices from attacks

fromZDNET
2 months ago
Privacy technologies

Should you be afraid of smart home hacking? What it is, and how experts prevent it

Tech industry
from24/7 Wall St.
1 month ago

AMD Looks to Displace Intel With World's First Copilot+ Desktop Chips

The AI PC market will grow at 30% annually from 2025 to 2034, reaching $967 billion, driven by on-device AI demand, with AMD's Ryzen AI 400 Series challenging Intel's x86 dominance through superior AI performance capabilities.
Software development
fromDevOps.com
1 month ago

When AI Gets It Wrong: The Insecure Defaults Lurking in Your Code - DevOps.com

Generative AI accelerates code development but introduces security vulnerabilities because AI models learn insecure patterns from training data rather than understanding security principles.
fromArs Technica
1 month ago

What happens to a car when the company behind its software goes under?

As vehicles become platforms for software and subscriptions, their longevity is increasingly tied to the survival of the companies behind their code. When those companies fail, the consequences ripple far beyond a bad app update and into the basic question of whether a car still functions as a car. Over the years, automotive software has expanded from performing rudimentary engine management and onboard diagnostics to powering today's interconnected, software-defined vehicles.
Cars
Information security
fromSecurityWeek
3 weeks ago

ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Moxa, Mitsubishi Electric

Industrial control system manufacturers Siemens, Schneider Electric, Mitsubishi Electric, and Moxa released multiple security advisories addressing critical and high-severity vulnerabilities in their ICS products.
Privacy technologies
fromFuturism
1 month ago

Hackers Working on Method to Make Ring Cameras Store Footage Locally, Never Giving It to Amazon

Fulu Foundation offers bounties to modify Ring doorbells to block Amazon data transfers and grant owners full local control of video and connectivity.
Software development
fromZDNET
1 month ago

Linux explores new way of authenticating developers and their code - here's how it works

The Linux kernel is transitioning from PGP-based developer identification to a more efficient system that addresses privacy concerns and streamlines the cumbersome face-to-face key-signing verification process.
Information security
fromThe Hacker News
3 weeks ago

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

SAP released security updates for two critical vulnerabilities enabling arbitrary code execution: CVE-2019-17571 in Quotation Management Insurance and CVE-2026-27685 in NetWeaver Enterprise Portal Administration.
#cisco-catalyst-sd-wan-manager
Information security
fromTechzine Global
1 month ago

Cisco details further vulnerabilities in Catalyst SD-WAN Manager

Cisco disclosed five vulnerabilities in Catalyst SD-WAN Manager with CVSS scores ranging from medium to critical, two actively exploited, requiring immediate patching with no workarounds available.
Information security
fromComputerWeekly.com
1 month ago

Zero-day in Android phone chips under active attack | Computer Weekly

A zero-day memory corruption vulnerability in Qualcomm chipsets affecting over 200 Android devices is actively exploited in the wild, requiring immediate security updates.
Information security
fromThe Hacker News
1 month ago

Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More

Multiple attack vectors across network systems, cloud infrastructure, and AI platforms exploit access control gaps, exposed credentials, and trusted service misuse to target high-value sectors.
fromZDNET
2 months ago

Linux at CES 2026: Tux is alive and well in IoT, cars, and AI

Canonical, Ubuntu Linux's parent company, is the most visible Linux and open-source business in Vegas. While neither Canonical nor anyone else is showing off a new Linux desktop, the company, in partnership with Nvidia, is demonstrating Ubuntu Linux running on the NVIDIA DGX Spark. This is a desktop supercomputer featuring an Nvidia GB10 Grace Blackwell superchip with 128 GB of RAM and 4 TB of storage for $3,999. Now, this is my kind of desktop PC.
Artificial intelligence
Artificial intelligence
fromEngadget
2 months ago

He could just turn it off

Grok's image-generation continues despite producing sexually exploitative content; Elon Musk can disable the feature and should do so to prevent legal and moral harm.
fromZDNET
1 month ago

Your default home Wi-Fi setup isn't nearly as private as it should be - 6 free ways to improve it

We live in a time where privacy is something we actually have to work to enjoy. Achieving a level of privacy we once had takes work, and you need to start thinking beyond a single desktop, laptop, tablet, or phone -- all the way to your LAN. Before I scare you all off, understand that this starts on the desktop and extends to the LAN. By beefing up both your devices and your network, you'll achieve a level of privacy that you wouldn't otherwise have.
Privacy technologies
Tech industry
fromComputerWeekly.com
1 month ago

Broadcom claims enterprise Wi-Fi 8 first | Computer Weekly

Broadcom introduced the first Wi-Fi 8 access point and switch service engineered for AI-ready enterprise networks requiring multi-gigabit speeds, ultra-low latency, edge AI, and enhanced security.
fromSecurityWeek
1 month ago

Critical Flaws Exposed Gardyn Smart Gardens to Remote Hacking

According to CISA, Gardyn products were affected by two critical and two high-severity vulnerabilities. One of the critical flaws, tracked as CVE-2025-29631, is a command injection issue that can be exploited to execute arbitrary OS commands on the targeted device. The second critical vulnerability, CVE-2025-1242, is related to the exposure of hardcoded admin credentials that can be used to gain full control of the Gardyn IoT Hub.
Information security
fromMedium
2 months ago

Creating a smart home automation with Home Assistant and Scala fs2.

After some investigation, I found that Home Assistant has an integration with Node-RED - a graphical tool for manipulating data and event streams. It could probably satisfy most of my needs. But from time to time I remember that I'm a professional software developer, working with event streams for many years, and for this kind of problem there's nothing better than math (and Scala's type system, which supports it very well).
Software development
Artificial intelligence
fromZDNET
2 months ago

This OS quietly powers all AI - and most future IT jobs, too

Linux is the foundational platform for modern AI, powering GPUs, frameworks, tooling, orchestration, and driving increased demand for Linux-focused IT roles.
Software development
fromTheregister
1 month ago

CentOS is coming to RISC-V soon if you have the kit

CentOS Stream remains active with an engaged community, notable corporate adoption, and a new official quokka mascot announced at CentOS Connect 2026.
Tech industry
fromMedium
2 months ago

Zigbee : A Comprehensive Overview on Protocol Stack

Zigbee provides low-power, low-data-rate wireless mesh networking with layered security and long battery life for smart home and sensor applications.
Gadgets
fromComputerWeekly.com
1 month ago

Direct-to-device connectivity set to underpin next generation of industrial IoT | Computer Weekly

Ubiquitous satellite direct-to-device (D2D) connectivity will drive rapid, near-term mass adoption in industrial IoT across agriculture, mining, energy, transport and utilities.
Artificial intelligence
fromDevOps.com
1 month ago

When Open Networks Meet AI Coding: A Tsunami of Smart Enterprise Apps - DevOps.com

Telcos are exposing programmable network APIs while AI code-generation accelerates development, enabling rapid creation of network-aware enterprise applications.
Artificial intelligence
fromMedium
3 months ago

Engineering After AI: Why Writing Code Is No Longer the Hard Part

Generative AI makes building cheap, shifting engineering's core work from constructing systems to upstream thinking, problem definition, and accepting responsibility for outcomes.
Gadgets
fromThe Verge
1 month ago

The DJI Romo robovac had security so poor, this man remotely accessed thousands of them

A vulnerability allowed remote control and live camera access to roughly 7,000 DJI Romo robot vacuums worldwide, exposing locations and floor plans.
fromEngadget
2 months ago

Ring can now verify if a video has been altered

Ring has launched a new tool that can tell you if a video clip captured by its camera has been altered or not. The company says that every video downloaded from Ring starting in December 2025 going forward will come with a digital security seal. "Think of it like the tamper-evident seal on a medicine bottle," it explained. Its new tool, called Ring Verify, can tell you if a video has been altered in any way.
Gadgets
Gadgets
fromTheregister
2 months ago

Help! Does anyone on the bus know Linux?

A bus-mounted digital signage system failed to boot, displaying a GRUB rescue prompt that requires Linux expertise and input access to repair.
Gadgets
fromTheregister
2 months ago

There's nothing micro about this super-sized Arduino Uno

A fully functional oversized Arduino was built from 3D-printed parts, plywood layers, and an internal Arduino Nano providing real computing, LEDs, reset, and GPIO.
fromdzone.com
2 months ago

Managing Changing Hardware/Peripherals in a Robust POS

Retail point-of-sale systems today offer a wide range of options for peripherals and hardware. Their technical specifications play a major role in selection, and big retailers often choose multiple vendors to reduce a single point of failure. This gives them an advantage to negotiate price or support as well. Technically, these peripherals also require updating with new models and may have new feature sets. This necessitates the redevelopment of point-of-sale applications, increasing development costs.
Information security
Gadgets
fromTheregister
2 months ago

Engineer caused data loss by cleaning PCs with welding tools

A structural engineer destroyed five AutoCAD PCs by using oil-laden compressed air and acetone, causing hardware failure and loss of engineering files.
Information security
fromThe Hacker News
2 months ago

Unpatched Firmware Flaw Exposes TOTOLINK EX200 to Full Remote Device Takeover

A firmware-upload error in TOTOLINK EX200 can trigger an unauthenticated root-level telnet service, enabling authenticated web-interface users to gain full device control.
fromThe Atlantic
1 month ago

Smart Homes Are Terrible

All of the appliances and systems are brand-new: the HVAC, the lighting, the entertainment. Touch screens of various shapes and sizes control this, that, and the other. Rows of programmable buttons sit where traditional light switches would normally be. The kitchen even has outlets designed to rise up from the countertop when you need them, and slide away when you don't.
Gadgets
Gadgets
fromZDNET
2 months ago

Your Raspberry Pi 5 just got a big AI upgrade - thanks to this new add-on

AI HAT+ 2 upgrades Raspberry Pi AI acceleration to 40 TOPS with 8GB RAM, enabling local LLM, VLM, generative and vision AI workloads.
#secure-boot
fromZDNET
1 month ago
Information security

Your PC's critical security certificates may be about to expire - how to check

fromZDNET
1 month ago
Information security

Your PC's critical security certificates may be about to expire - how to check

fromSecurityWeek
1 month ago

ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, Phoenix Contact

Siemens has published eight new advisories. The company has released patches and mitigations for high-severity issues in Desigo CC, Sentron Powermanager, Simcenter Femap and Nastran, NX, Sinec NMS, Solid Edge, and Polarion products. A medium-severity flaw has been found in Siveillance Video Management Servers. Exploitation of the vulnerabilities can lead to unauthorized access, XSS, DoS, code execution, and privilege escalation.
Information security
Information security
fromTechzine Global
2 months ago

Cisco launches agentic security tools for autonomous AI security

Cisco Foundation AI adds agentic security tools—Foundation-sec-8B-Reasoning, Adaptive AI Search Framework, and PEAK—to enable transparent, human-controllable autonomous threat analysis.
Information security
fromZero Day Initiative
2 months ago

Zero Day Initiative - The Alpitronic HYC50 Hardware Teardown for Pwn2Own Automotive 2026

Alpitronic HYC50 is a well-documented, mature EV charger with exploitable physical debug and manufacturing interfaces and custom development units requiring hardware inspection before power-up.
#linux-malware
Information security
fromThe Hacker News
2 months ago

Ongoing Attacks Exploiting Critical RCE Vulnerability in Legacy D-Link DSL Routers

CVE-2026-0625 permits unauthenticated command injection in D-Link DSL gateway dnscfg.cgi, enabling remote code execution and active exploitation of legacy models.
fromZDNET
2 months ago

That handy-looking router USB port can cause problems - here's what PC experts use instead

But here's the truth: I don't recommend using it. Having a USB port on the router sounds convenient, but there are a few problems. The fact is that USB ports on routers aren't secure. Many of them operate on outdated protocols, creating vulnerabilities that can be exploited by bad actors. This doesn't mean the entire router is compromised, but the USB port can be a weak link. Using it is not a risk worth taking, especially when safer alternatives are available.
Information security
Information security
fromSecurityWeek
2 months ago

Organizations Warned of Exploited Linux Vulnerabilities

Critical GNU Inetutils telnetd authentication bypass (CVE-2026-24061) enables remote root via crafted Telnet USER variable, and kernel integer overflow (CVE-2018-14634) permits privilege escalation.
Information security
fromThe Hacker News
2 months ago

VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code

VoidLink is a sophisticated, Zig-based Linux malware framework largely generated with AI assistance by a single developer, aimed at stealthy long-term cloud access.
[ Load more ]