TPM 2.0 Library Vulnerabilities May Affect Billions of IoT Devices

Read Time:4 Second

The disclosed flaws occurred when handling malicious TPM 2.0 commands with encrypted parameters

Read More