Home SecurityHacking 39 hardware vulnerabilities: A guide to the threats