60 results on '"COMPUTER firmware"'
Search Results
2. Open Source Firmware.
3. Risk Prediction of IoT Devices Based on Vulnerability Analysis.
4. ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
5. Factors Influencing the Decision to Proceed to Firmware Upgrades to Implanted Pacemakers for Cybersecurity Risk Mitigation.
6. NIKSUN INTRODUCES LOGWAVE SIEM SOLUTION.
7. Advance and Development of Computer Firmware Security Research.
8. An Interoperability Solution for Legacy Healthcare Devices.
9. Manipulation of hard drive firmware to conceal entire partitions.
10. ASPECTS CONCERNING THE INFORMATION SYSTEMS SECURITY.
11. Locked out? Get back into Windows 8 by resetting your password.
12. Update your Asus router's firmware right now or risk botnet infection.
13. Pacemaker Cybersecurity: Local Experience With a Firmware Upgrade.
14. Preinstalled firmware updater puts 128 Dell models at risk.
15. SEQUITUR LABS SECURES AI/ML MODELS AT THE EDGE.
16. FEEDBACK.
17. Digital Danger.
18. NEW RELEASE OF FORTIGATE ANTIVIRUS FIREWALLS UNVEILED.
19. Embedded Devices Gird Up Against Cyber Threats.
20. When Firmware Modifications Attack: A Case Study of Embedded Exploitation
21. First-ever known cyber-attack via UEFI firmware.
22. INTEL ISSUES SECURITY UPDATES TO PROTECT SYSTEMS.
23. Old battles resurfacing.
24. SECURITY ALERT!
25. Spectre CPU patches can cause unwanted reboots, Intel warns.
26. WD Patches Backdoor Security Flaw in My Cloud NAS Devices.
27. Configuration Management System.
28. Lenovo ThinkPwn UEFI exploit also affects products from other vendors.
29. Dell Offers BIOS Verification for Commercial PCs.
30. Tape security... with compromises.
31. Vulnerability in popular bootloader puts locked-down Linux computers at risk.
32. Cisco warns customers about attacks installing rogue firmware on networking gear.
33. Lenovo's Service Engine marks yet another bloatware blunder for the company.
34. Hacking Team's malware uses UEFI rootkit to survive OS reinstalls.
35. Microsoft tightens Windows 10's Secure Boot screws: Where does that leave Linux?
36. Snowden docs show CIA's attempts to defeat Apple device security.
37. Equation cyberspies use unrivaled, NSA-style techniques to hit Iran, Russia.
38. Advantech industrial communication devices vulnerable to remote code execution.
39. Car monitoring dongle vulnerable to hacking, says security researcher.
40. Firmware flaws could allow a malicious reflash, US CERT warns.
41. How hackable are web-connected devices?
42. Despite patches, Supermicro's IPMI firmware is far from secure, researchers say.
43. More Than A Dozen Brands Of Security Camera Systems Vulnerable To Hacker Hijacking.
44. The Boot Race.
45. Blade PC ports go small.
46. Be a 'Book-Savvy Traveler.
47. The hidden truth about DVD.
48. Getting Comfy with the IT Side.
49. Backdoor dubbed Pork Explosion lets attackers go hog wild on Android phones.
50. Firmware exploit can defeat new Windows security features on Lenovo ThinkPads.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.