#hardwaresecurity
Explore tagged Tumblr posts
groovy-computers · 20 days ago
Photo
Tumblr media
A Reddit user discovered a shocking issue with the ZOTAC GeForce RTX 5090 GPU purchased at Micro Center—inside the sealed box, instead of the GPU, there were backpacks. Over 30 similar cases have been confirmed at the Santa Clara store, raising serious concerns about supply chain tampering. Micro Center acknowledged these reports and confirmed that the boxes were altered at the ZOTAC factory in China. The value of these missing GPUs could exceed CAD 120,000, highlighting the need for careful inspection before purchase. Have you ever encountered a surprising unboxing? Share your story below! Stay vigilant with your tech purchases and make sure to verify sealed packaging—your investment deserves protection. #HardwareSecurity #GPU #TechScandal #MicroCenter #ZOTAC #RTX5090 #GamingHardware #SupplyChain #TechNews #Innovations #TechSafety
0 notes
virtualizationhowto · 1 year ago
Text
Windows 11 Security Ebook Download
Windows 11 Security Ebook Download #windowssecurity #windows11security #cybersecurity #hardwaresecurity #operatingsystemsecurity #applicationsecurity #identity #privacy #cloudservices #virtualizationhowto #vhtforums #homelab #homeserver
Windows 11 has many security features built into its OS architecture, which helps to provide multiple layers of security. It relies on a structured approach that covers hardware security, operating system security, application security, identity, privacy, and cloud services. Take a look at some of the features and then a download link to a Windows 11 Security Ebook. Table of contents1. Hardware…
Tumblr media
View On WordPress
0 notes
osintelligence · 2 years ago
Link
https://bit.ly/3JEgv1B - 🔒 Despite US Commerce Department warnings, encryption chips sold by a subsidiary of Hualan Microelectronics, a company with suspected ties to China's military, have been integrated into Western military and intelligence networks. These chips have ended up in hardware used by organizations such as NASA, NATO, and US/UK militaries. #CyberSecurity #SupplyChainRisk 🇨🇳 The chips originate from Initio, a subsidiary of Hualan acquired in 2016. Initio primarily creates controller chips for consumer storage products, yet potential 'backdoors' in the chips could enable China to access sensitive Western information, despite no evidence of such backdoors existing to date. #NationalSecurity #DataProtection 📋 Hualan's Initio chips are used by Western digital storage manufacturers, including Lenovo and Western Digital. Particularly concerning are lesser-known manufacturers iStorage, SecureDrive, and Apricorn, who list Western government, military, and intelligence agencies as customers. #InfoSec #DataStorage 🔎 If hidden vulnerabilities or backdoors exist in these chips, it would allow anyone with physical access to the drives to defeat encryption features and access data. Even thorough inspection could fail to uncover these potential backdoors, making trust a crucial element in vendor selection. #Encryption #CyberRisk 🤔 The potential misuse of encryption chips prompts further questions about the hardware supply chain and its associated risks. Encryption chips, sold by the subsidiary of a company on the Commerce Department's trade restrictions list, show the complexity of supply chain navigation, raising potential oversight issues. #HardwareSecurity #SupplyChainManagement 🌐 Institutions such as NATO, the US Navy, and the UK Ministry of Defence affirm rigorous security vetting, yet the chips continue to be used. Cryptography experts warn of hidden backdoors even in products with cybersecurity certification, suggesting possible gaps in the regulatory environment.
0 notes
paymentonlinemalaysia · 2 years ago
Text
Hardware cybersecurity pioneer Flexxon takes home quartet of awards at 2023 Global InfoSec Awards
Tumblr media
🏆🌍 Flexxon, the pioneer in hardware cybersecurity solutions, has received four prestigious awards at the Global InfoSec Awards 2023! 🎉🔒
🌟 Learn more about their groundbreaking achievements! 🌟
👉 [Link to Article]: https://x-phy.com/hardware-cybersecurity-pioneer-flexxon-takes-home-quartet-of-awards-at-2023-global-infosec-awards/
🗣️ Ms Camellia Chan, Co-Founder and CEO of Flexxon, expressed her gratitude for the awards and emphasized the need for a comprehensive cybersecurity approach that combines software and hardware solutions. She urged other companies to embrace hardware-based fortification for enhanced data protection.
👉 Read the article to discover more about Flexxon's X-PHY Cybersecure SSD, its features, and how it's transforming the cybersecurity landscape. Don't miss out on the chance to explore their innovative suite of products at the RSA Conference, booth number 2441, Moscone South Expo! 🚀💻
0 notes
cybersecurityplace · 4 years ago
Link
0 notes
jisasoftech · 5 years ago
Photo
Tumblr media
JISA's Solutions For More Info contact us 9619222553 OR Mail us [email protected] www.jisasoftech.com
0 notes
mysecurityjourney · 7 years ago
Text
Once Again Physical Security Trumps Everything
If you ever heard the the old adage that “If the attacker has your machine, it is no longer yours” it still rings true today.
Even though there have been many advances in protecting data once it falls into the hands of an attacker, someone will find a way to break in. This has been shown to be true again.  Researchers Heat Up Cold-Boot Attack That Works on All Laptops
Cold Booting attacks have been around for a while, and the name is derived from the original method of getting information. With a traditional Cold Boot attack you can turn off the machine, put the machine in sleep or hibernate mode, and dump the memory. One method involves using canned air to freeze the memory, then pull the disk image from the memory. When a computer goes to sleep it basically will save the system “state”. What this means is that this state can be recovered, and the entire running system will be accessible as if the computer had been unlocked (or never locked).
Recently with the implementation of BitLocker it is possible to protect the area by making BIOS changes, through pre-boot methods of verification, as well as using volume encryption. (Although FireWire still is an issue due to the transmission standard).
This new method allows someone to configure a micro-controller (basically a circuit board with programmable instructions) to act as an intermediary between the rewrite instructions, and the where the encryption keys are stored.
Using the encryption keys allows the attacker to unlock BitLocker and any encrypted drives/data, or plant a backdoor and use the trusted device/user to gain VPN access, and use the device as a pivot. 
Luckily hibernation is not vulnerable, the reason for this is that when hibernating BitLocker will encrypt the system state (similar to post shutdown/preboot). The drive data can be recovered, but it would not contain any of the encryption keys to make sense of the data.
BitLocker has gone through a lot of improvements, there used to be MBR exploits which were pretty easy to use to bypass BitLocker and today the traditional ways of pulling keys or images of running systems is harder due to OS integration and pre-boot settings. The bad thing/good thing about hardware is there is always a way to bypass it. That means the only thing you can hope to do is add complexity, and unfortunately obfuscation does not equal secure.
0 notes
securitynewswire · 7 years ago
Text
IPVideo Corporation Wins Most Innovative IOT HardwareSecurity Product at Global Security Exchange 2018 for HALO .
SNNX.com http://dlvr.it/QmDyjQ
0 notes
groovy-computers · 20 days ago
Photo
Tumblr media
Do you believe scams like receiving backpacks instead of high-end GPUs are just isolated incidents? Sadly, this is becoming an alarming trend. Recent reports highlight Micro Center’s ongoing struggle with tampered boxes, especially involving high-value graphics cards like the GeForce RTX 5090. A Santa Clara customer received a backpack-filled box, thinking it was his RTX 5090, fueling concerns about inside jobs and supply chain security. This situation underscores how forgers and scammers capitalize on scarcity and high demand for top-tier GPUs, with models like the Zotac RTX 5090 reaching $2,899 in retail. Criminals are now targeting both consumers and retailers by swapping authentic hardware for counterfeit or tampered items, risking millions in losses. To stay safe, always verify your purchase before leaving the store—especially for high-value components like GPUs. Documenting your unboxing, especially online orders, can serve as proof if issues arise. What steps do you take to ensure your electronics are genuine? Share your tips or whether you’ve experienced similar scams! #GPUScam #HardwareSecurity #TechScam #MicroCenter #RTX5090 #GraphicsCards #SupplyChain #TechSafety #ConsumerProtection #TechNews #GamingHardware #HardwareScams #Cybersecurity #HardwareFraud
0 notes
cybersecurityplace · 4 years ago
Link
0 notes
groovy-computers · 21 days ago
Photo
Tumblr media
Over $90,000 worth of RTX 5090 GPUs have been replaced in-box by crossbody backpacks at just one Silicon Valley Micro Center. This bizarre issue points to a possible supply chain problem from China, raising concerns about how widespread the problem might be. Recently, a Reddit user shared how they bought a Zotac RTX 5090 from a Micro Center in Santa Clara, only to find a backpack inside instead of the GPU. Further investigation revealed 31 other backpacks hidden in similar Zotac packaging. This revelation suggests a significant security breach at the factory level, potentially affecting thousands of high-end graphics cards. Considering the scope, estimates could involve over a hundred GPUs worth nearly $119,200 CAD, which could be gone before even reaching consumers. It’s a stark reminder to always open new hardware in store or record the unboxing process to verify your product’s integrity. Are you checking your boxes carefully, or trusting the store? Share your thoughts below! #GPU #RTX5090 #HardwareSecurity #GraphicsCards #PCGaming #TechNews #SupplyChain #MicroCenter #Nvidia #Zotac #GamingHardware #TechAlert #GPUTheft
0 notes
securitynewswire · 7 years ago
Text
Web Events Hardwaresecured Logins Ethernet Industry 4.0 Wirelessly Charged Wearables
http://dlvr.it/QTpxqH
0 notes