{"id":2368,"date":"2019-01-14T08:40:46","date_gmt":"2019-01-14T07:40:46","guid":{"rendered":"https:\/\/werle.pro\/?p=2368"},"modified":"2019-01-14T09:22:28","modified_gmt":"2019-01-14T08:22:28","slug":"hardware-attacks-hackers-aims-for-the-jackpot","status":"publish","type":"post","link":"https:\/\/werle.pro\/index.php\/2019\/01\/14\/hardware-attacks-hackers-aims-for-the-jackpot\/","title":{"rendered":"Hardware attacks &#8211; Hackers aims for the jackpot"},"content":{"rendered":"<p>\u00ab\u00a0There are two main types of hardware attack.\u00a0\u00bb ;<\/p>\n<p>\u00ab\u00a0One is to try to subvert the device in normal operation, generally by attaching something to an I\/O port or to the PCB itself.\u00a0\u00bb<\/p>\n<p>\u00ab\u00a0Another level of attack is to try to peer more deeply into the target in the hope of reverse-engineering the design or to pull out encryption keys and other sensitive data &#8230; \u00a0\u00bb<\/p>\n<p><a href=\"http:\/\/www.newelectronics.co.uk\/electronics-technology-ezine\/Hackers-aims-for-the-jackpot\/199672\/183634\/\">www.newelectronics.co.uk\/electronics-technology-ezine\/Hackers-aims-for-the-jackpot\/199672\/183634\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00ab\u00a0There are two main types of hardware attack.\u00a0\u00bb ; \u00ab\u00a0One is to try to subvert the device in normal operation, generally by attaching something to an I\/O port or to the PCB itself.\u00a0\u00bb \u00ab\u00a0Another level of attack is to try to peer more deeply into the target in the hope of reverse-engineering the design or &#8230; <a title=\"Hardware attacks &#8211; Hackers aims for the jackpot\" class=\"read-more\" href=\"https:\/\/werle.pro\/index.php\/2019\/01\/14\/hardware-attacks-hackers-aims-for-the-jackpot\/\" aria-label=\"Read more about Hardware attacks &#8211; Hackers aims for the jackpot\">Lire la suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[10],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ALXt-Cc","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/2368"}],"collection":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/comments?post=2368"}],"version-history":[{"count":3,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/2368\/revisions"}],"predecessor-version":[{"id":2373,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/2368\/revisions\/2373"}],"wp:attachment":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/media?parent=2368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/categories?post=2368"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/tags?post=2368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}