I think we all can collectively arrive at the decision that hardware security is a necessity now. If you are on this website, I am pretty sure you know who we are. The hardwear.io team can’t be with you all the time, and that’s why we have decided to start this blog so that we remind you how important hardware security is. We are going to display some latest hardware hacking news here every two weeks. Stay tuned!

SOME HARDWARE-BASED PASSWORD MANAGERS LACK PROPER SECURITY
It has been discovered that some hardware-based password managers have poor security for the data stored in them. This allows those to be read in plain text, even after being reset.
This flaw was discovered by Phil Eveleigh of Pen Test Partners, who tested the RecZone Password Safe device. Using a Raspberry Pi microcomputer, he was able to read, as well as extract the information available on the flash chip of the device.
For more, visit:
https://www.pentestpartners.com/security-blog/hacking-hardware-password-managers-the-reczone/
FIRST EXPERIMENT WITH SELF-DRIVING TRAIN SUCCESSFUL
Nederlandse Spoorwegen (NS) carried out its first experiment with a self-driving train on 11th December, this year. The train departed and arrived on time and thus, the experiment was a success.
The Sprinter used for this experiment was furnished with a particular computer unit that communicated with the operating system of the train. This system provided traction, braked at the proper place along with the platform, and operated according to a programmed timetable.
For more, visit:
https://nltimes.nl/2019/12/11/ns-successfully-experiments-self-driving-train
CRYPTO IGNITION PHONE KEYS EXPLAINED
Secure communication is the key to protect the sovereignty of any nation. This requirement led the U.S. into developing secure telephone networks, of which STU-III is the last of the series. John McMaster took it upon himself to test out these secure telephones and replicate the secure keys.
He used a physical device, known as Crypto Ignition Key, and inserted into the telephone and turned it until a clunk sound came out of the motion. Now, this key contains digital encryption keys that combine with the keys in the telephone and results in the encryption of the call.
For more, visit:
https://hackaday.com/2019/12/02/john-mcmaster-explains-crypto-ignition-phone-keys-and-how-to-reproduce-them/
VOLTAGE CAN BE MESSED WITH TO STEAL SECRETS FROM INTEL CHIPS
Hackers can break the security mechanism of Intel Chips by tinkering with the power supply, resulting in exposing sensitive secrets. This technique is called Plundervolt, which entails implanting malware on a computer that, for a temporary period, reduces the electricity voltage flowing to an Intel chip.
For more, visit:
https://www.wired.com/story/plundervolt-intel-chips-sgx-hack/

Like the news? Want more? Come back in two weeks. See you soon!