CPU vulnerabilities – and it does not matter if you are team Intel, team AMD or team Apple!

cpu 200

There have been two pieces of recent research that are pointing to serious issues with a lot of the silicon we use to power our computers. Some of which may be irreparable. The Apple M1 attack is called PACMAN, as it exploits the Pointer Authentication Code (PAC). This attack bypasses …

Research that shows it is possible to hack an iPhone when it is turned off and drive off in your Tesla – UPDATED 18 May 2022 with real world examples of Bluetooth vulnerabilities

This is theoretical research that shows it may be possible to run malware on an iPhone that is still active even when the phone is powered off, by abusing a lack of authentication in the Bluetooth system and the fact that the Bluetooth is used in the Apple “find my…” …