Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: used Clear Filter

OpenSERDES – Open Hardware Serializer/Deserializer (SerDes) in Verilog (2020)

OpenSERDES Serializer/Deserializer (SerDes) is the most important functional block used in high speed communication. SerDes converts parallel data into a serial (one bit) stream of data that is transmitted over a high-speed connection, such as LVDS, to a receiver that converts the serial stream back to the original, parallel data. A global CLOCK signal is present to sequence the serialization and deserialization of data from one block to another. Technology: Skywater OpenPDK 130nm Tools Use

OpenSERDES – Open Hardware Serializer/Deserializer (SerDes) in Verilog

OpenSERDES Serializer/Deserializer (SerDes) is the most important functional block used in high speed communication. SerDes converts parallel data into a serial (one bit) stream of data that is transmitted over a high-speed connection, such as LVDS, to a receiver that converts the serial stream back to the original, parallel data. A global CLOCK signal is present to sequence the serialization and deserialization of data from one block to another. Technology: Skywater OpenPDK 130nm Tools Use

eBay and Vestiaire Collective Want an Exemption from Trump’s Tariffs

Last month, Suzanne Smith-Darley felt fantastic. She had just bought a used Chanel handbag from a Japanese seller on eBay for $800—a steal compared to the original asking price of $1,400. About a week later an email arrived that crushed her: DHL was demanding a $142 fee for US tariffs before it would deliver the well-worn medallion tote to Smith-Darley’s Atlanta doorstep. “It goes to Japan, has a whole life, and it could be in the trash literally,” she says. “I’m willing to pick it out of the tr

Infineon security microcontroller flaw enabled extraction of TPM secret keys

A few months ago, security researcher Thomas Roche presented his fundamental research on secure elements used in the YubiKey 5. The security element is the Infineon SLE78, which contains a proprietary implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA). Using side-channel attacks and a great deal of smart research, the author discovered a vulnerability in Infineon Technologies' cryptographic library and, as a result, was able to extract the ECDSA secret key from the secure

Fog ransomware attack uses unusual mix of legitimate and open-source tools

Fog ransomware hackers are using an uncommon toolset, which includes open-source pentesting utilities and a legitimate employee monitoring software called Syteca. The Fog ransomware operation was first observed last year in May leveraging compromised VPN credentials to access victims’ networks. Post-compromise, they used “pass-the-hash” attacks to gain admin privileges, disabled Windows Defender, and encrypted all files, including virtual machine storage. Later, the threat group was observed