Category Archives: devices
Microsoft issued another Microsoft Security Advisory on August 8, 2018. This concerns notes for Microsoft Surface devices regarding the Speculative Store Bypass (ADV180012) and Rogue System Register Read (ADV180013) vulnerabilities.
[German]Security researchers have analyzed smartphones on behalf of the Department of Homeland Security (DHS). They found vulnerabilities in devices from four major U.S. carriers that can be exploited.
Surprise: The Samsung Galaxy S7 is also affected by the meltdown vulnerability, although no Intel CPU is working there. This was announced to Reuters by security researchers from the University of Graz. Researchers Daniel Gruss, Moritz Lipp and Michael Schwarz … Continue reading
[German]A little Schadenfreude and a nice story for for annoyed Windows users who are facing a bricked system after an update install. Also happens to more prominent people, like Mr. Steven Sinofsky…
[German]Here is a security notification for users of HP inkjet printers. HP has discovered vulnerabilities in the firmware of various printers that allow remote code execution.
[German]Microsoft has released a series of firmware updates for the Surface Laptop, Surface Pro 4 and Surface Pro this week. Here is a short overview.
Kensington has developed a dock for the Microsoft Surface Pro, which transforms the tablet into a kind of mini surface studio. This means, the Surface can be arranged to float at any angle.
[German]The rumors of the last days has been true. Microsoft has introduced the Surface Go Tablet, which is entering the education market with a price starting at 399 US $ and a 10-inch display. From today, July 10, 2018, pre-orders … Continue reading
[German]So far I haven’t written about all rumors on Microsoft’s project Andromeda. Now, however, there are new information that concretizes some things. Microsoft’s Project Andromeda could be a foldable surface smartphone for your pocket.
[German]Security advice for owners of the TP-Link routers TL-WR841N and TL-WR841ND. Both models have security vulnerabilities, making the devices vulnerable to brute force and and cross-site request forgery attacks..