756 articles

WireTap and Battering RAM: attacks on TEEs

Hacking TEEs in server infrastructure

Two separate research papers vividly demonstrate how virtual systems can be compromised in a hostile environment — specifically, when the data owner can’t even trust the cloud provider.

Cybersecurity and privacy in LLM-powered AI browsers

The pros and cons of AI-powered browsers

A race between tech giants is unfolding before our very eyes. Who’ll be the first to transform the browser into an AI assistant app? As you test these new products, be sure to consider their enormous impact on security and privacy.