Security Series - Hardware Attack

June 2021

Role: Art Direction / Client: Self Directed

I have had a huge interest in cyber security for years and have been studying attacks and am surprised by the lack of precedence they seem to get. I decided to make a series based on some of the most devious attack vectors being used today. This first series is based on hardware attack vectors that use speculation to gain valuable data. These attacks are particularly nefarious in that they don't leave a trace when they steal data.