IT

Protection for hardware and firmware

Protection for sensitive systems

How new methods protect firmware and hardware from hackers

Our world is increasingly dependent on IT systems – but that also makes everyday technology and critical infrastructure vulnerable. Attackers can use vulnerabilities in firmware or even the hardware itself to gain access to data. IT researchers at the Ruhr University Bochum are developing new methods to protect sensitive technology from such attacks.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button