| ||Thread Tools|
|9th February 2010, 19:12||#1|
Join Date: May 2002
Hardware TPM Hacked
The new attack discovered by Christopher Tarnovsky is difficult to pull off, partly because it requires physical access to a computer.
But laptops and smart phones get lost and stolen all the time. And the data that the most dangerous computer criminals would seek likely would be worth the expense of an elaborate espionage operation.
Jeff Moss, founder of the Black Hat security conference and a member of the US Department of Homeland Security's advisory council, called Tarnovsky's finding "amazing."
|Thread||Thread Starter||Forum||Replies||Last Post|
|Using Your Old Socket 775 Mounting Hardware On Your Brand New P55 Setup||jmke||WebNews||0||22nd October 2009 14:18|
|Beat Gigabyte's own Benchmark Scores and Win Hardware||jmke||WebNews||0||9th October 2009 11:56|
|Upgrading From XP To Vista To Windows 7? With Old Hardware = Compatibility Issues||jmke||WebNews||0||25th February 2009 11:37|
|The State of Hardware Accelerated Physics||jmke||WebNews||0||26th July 2007 13:39|
|Intel Enables Hardware T&L on G965||jmke||WebNews||0||19th June 2007 15:38|
|Running Windows Vista on older hardware||jmke||WebNews||5||8th November 2006 17:11|
|There's nothing superior about Apple hardware||Sidney||WebNews||1||9th April 2006 22:29|
|Half-Life 2 Specs Revealed and Hardware Q&A||jmke||WebNews||0||13th July 2004 09:42|
|Global WIN introduces the Travel Box Dorri with hardware encryption technology||jmke||WebNews||0||25th April 2004 19:50|