Two buffer overflow flaws in the Trusted Platform Module (TPM) 2.0 specification could let attackers access or replace sensitive data, like cryptographic keys. TPM is a hardware-based solution that offers tamper-resistant operating systems and secure cryptographic services. It can be used to store passwords, cryptographic keys, and other important data, so any implementation flaws should […]
This article has been indexed from Information Security Buzz
Read the original article: