Morpheus chip foils attacks from 500 cybersecurity experts

clock • 2 min read

The chip randomises elements of code and data every 50 milliseconds, which researchers say makes it nearly uncrackable

A new processor has beaten off sustained attacks from more than 500 cybersecurity experts, as part of a bug bounty programme. The 'Finding Exploits to Thwart Tampering' (FETT) programme was orga...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
General Electric investigates data theft claimed by IntelBroker hackers

Hacking

Group claims to possess DARPA-related military information, SQL data and documents

clock 27 November 2023 • 2 min read

Security Technology

Fully homomorphic encryption allows applications to work with encrypted data without ever needing to decrypt it during analysis

clock 09 March 2021 • 2 min read

Communications

Algorithms developed under DARPA's SemaFor project will be able to scan more than 500,000 stories, videos, images and audio files to identify fakes

clock 02 September 2019 • 3 min read
Most read
01

Ransomware targets London branch of China's ICBC

13 September 2024 • 2 min read
02

Teen arrested over TfL cyberattack

13 September 2024 • 3 min read
03
05

Avis notifies customers of data breach

10 September 2024 • 3 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Security Technology

Saving face: Five key considerations when navigating the use of facial recognition technology

Saving face: Five key considerations when navigating the use of facial recognition technology

Facial recognition brings legal and reputational risks

Ashley Avery, Paolo Sbuttoni and Rachel Griffith
clock 03 September 2024 • 3 min read
SSO is dead: Why the age of zero trust demands secure explicit sign-on

SSO is dead: Why the age of zero trust demands secure explicit sign-on

Single sign-on's cons now outweigh the pros

Al Lakhani
clock 03 September 2024 • 5 min read
Microsoft mandates multi-factor authentication for Azure sign-in

Microsoft mandates multi-factor authentication for Azure sign-in

MFA requirement will be implemented in stages

clock 20 August 2024 • 3 min read