The Intel Microcode Boot Loader creates a bootable USB flash drive that automatically applies the latest Intel microcodes to your identified CPU so that you are protected from the speculative execution side-channel attacks called Spectre.
A new side-channel vulnerability has been discovered called PortSmash that uses a timing attack that to steal information from other processes running on the same SMT/hyper-threading enabled CPU core. Utilizing this attack, researchers were able to steal the private decryption key from an OpenSSL thread running in the same core.
As part of today's Intel's Fall Desktop Launch event, new 9th generation CPUs were announced that include hardware protection for two of the Spectre and Meltdown vulnerability variants.
Intel has announced that they are live streaming their 2018 Desktop Launch Tomorrow at 10am EST via the Intel Newsroom. The details are vague other than that they are announcing the "latest PC performance developments from Intel."
Academics and private sector researchers have revealed details today about three new vulnerabilities affecting Intel CPUs.
At the DEF CON 26 security conference held in Las Vegas last week, a security researcher detailed a backdoor mechanism in x86-based VIA C3 processors, a CPU family produced and sold between 2001 and 2003 by Taiwan-based VIA Technologies Inc.
Scientists have published a paper today detailing a new Spectre-class CPU attack that can be carried out via network connections and does not require the attacker to host code on a targeted machine.
Academics from the University of California, Riverside (UCR) have published details last week about a new Spectre-class attack that they call SpectreRSB.
Academics from multiple universities have announced fixes for two severe security flaws known as Spectre and Rowhammer.
A month after details about the "Lazy FP State Restore" Intel CPU bug surfaced online, Microsoft has rolled out patches to fix this vulnerability at the operating system's level.
Two security researchers have revealed details about two new Spectre-class vulnerabilities, which they've named Spectre 1.1 and Spectre 1.2.
Upcoming additions to the WebAssembly standard may render useless some of the mitigations put up at the browser level against Meltdown and Spectre attacks, according to John Bergbom, a security researcher at Forcepoint.
The OpenBSD project announced today plans to disable support for Intel CPU hyper-threading due to security concerns regarding the theoretical threat of more "Spectre-class bugs."
What a horrible year in security for Intel. First we had the Meltdown and Spectre vulnerabilities that never seem to go away. Now Intel has announced a new speculative execution side channel vulnerability involving "Lazy FP state restore" that could allow a malicious program to read data being used by other processes.
At the Computex Tapei conference, Intel has officially announced the upcoming availability of their 8th Generation Intel® Core™ i7-8086K Limited Edition CPU. This processor is being released to to commemorate the 40th anniversary of Intel's 8086 processor & Intel's first consumer desktop processor that runs out-of-the-box at speeds.
For the past few months there have been rumors that Intel would be releasing a special edition Core i7-8086K processor to celebrate the 40th anniversary of the 8086 processor. Yesterday, retailers were found online that were advertising the special processor with a speeds of 4Ghz and 5Ghz.
Four researchers from the Fraunhofer Institute for Applied and Integrated Safety in Munich, Germany have published a research paper this week detailing a method of recovering data that is normally encrypted by AMD's Secure Encrypted Virtualization (SEV), a safety mechanism designed to encrypt the data of virtual machines running on s
Security researchers from Eclypsium have detailed yesterday a new variation of the Spectre attack that can recover data stored inside a secure CPU area named the System Management Mode (SMM).