Blogs
Links
Archives
Categories
Social networks
Awards
Sponsors
(Paypal-Donations)Recent Comments
- Wally on BlueSky Invite codes available for my readers
- Scott Pistorino on BlueSky Invite codes available for my readers
- Stefano on BlueSky Invite codes available for my readers
- Axel on Windows 10/11: "HP Smart" printer app is installed without permission
- SandroSilvestre on BlueSky Invite codes available for my readers
Meta
Recent Comments
- Wally on BlueSky Invite codes available for my readers
- Scott Pistorino on BlueSky Invite codes available for my readers
- Stefano on BlueSky Invite codes available for my readers
- Axel on Windows 10/11: "HP Smart" printer app is installed without permission
- SandroSilvestre on BlueSky Invite codes available for my readers
Archives
Categories
Meta
Tag Archives: TPM
Surface Pro 3 and the (Card Blanche) TPM vulnerability
[German]Here is another addendum to the topic "we are becoming more secure with hardware and software". Recently, Microsoft had to admit a TPM vulnerability (Card Blanche) for its Surface Pro 3 and sent a corresponding security notification around. In addition, … Continue reading
Advertising
Windows 11: Microsoft enforces TPM 2.0 on virtual machines
[German]That's it for Windows 11 – at least with older hardware, if I'm right. If the hardware requirements already caused head shaking and unstoppable enthusiasts were looking for ways to install the operating system on machines that did not meet … Continue reading
How to find weak passwords in Active Directory and eliminate them with PowerShell
[Sponsored Post]Weak or compromised passwords are a known gateway for attackers. If you are able to identify which users in Active Directory (AD) are threatened by this, then PowerShell can help to remedy it. However, PowerShell scripts cannot eliminate basic AD deficits, other tools are needed for this. More ...
TPM-FAIL puts Trusted Platform Module at risk
[German]A newly discovered vulnerability makes it possible to steal ECDSA signature keys by timing attack from the supposedly secure memory area of TPM chips (Intel fTPM 2.0, STMicroelectronics ST33-TPM). Advertising
Advertising
Security: TPM vulnerable; and dump mode for Intel ME
[German]Currently, two security issues are on the agenda. Meanwhile, an approach is known to get full access to the Intel Management Engine (Intel ME). And two attack methods on TPM chips from computers have become known. Advertising