(Source: SecurityWeek) Security researchers with NCC Group have documented 11 vulnerabilities impacting … JTAG debug may be usable to circumvent software security mechanisms,…