In this talk, we will discuss actual trends on hardware trojan design and implementation. We will analyze different attack techniques based on implementation details and countermeasures. Furthermore, we will present a demonstration of malicious logic in a commercial microprocessor and also a low-cost hardware trojan which exfiltrates data using radio signals.