Academics and private sector researchers have revealed details today about three new vulnerabilities affecting Intel CPUs.
A cryptographic bug affects the Bluetooth implementations and operating system drivers of Apple, Broadcom, Intel, Qualcomm, and possibly other hardware vendors.
Academics from the University of California, Riverside (UCR) have published details last week about a new Spectre-class attack that they call SpectreRSB.
A month after details about the "Lazy FP State Restore" Intel CPU bug surfaced online, Microsoft has rolled out patches to fix this vulnerability at the operating system's level.
Two security researchers have revealed details about two new Spectre-class vulnerabilities, which they've named Spectre 1.1 and Spectre 1.2.
The OpenBSD project announced today plans to disable support for Intel CPU hyper-threading due to security concerns regarding the theoretical threat of more "Spectre-class bugs."
What a horrible year in security for Intel. First we had the Meltdown and Spectre vulnerabilities that never seem to go away. Now Intel has announced a new speculative execution side channel vulnerability involving "Lazy FP state restore" that could allow a malicious program to read data being used by other processes.
At the Computex TapeiÂ conference, Intel has officially announced the upcoming availability of theirÂ 8th Generation IntelÂ® Coreâ¢ i7-8086K Limited Edition CPU. This processor is being released to to commemorate the 40th anniversary of Intel'sÂ 8086 processor & Intel's first consumer desktop processor that runs out-of-the-box at speeds.
Earlier today, Microsoft released cumulative update KB4100403 that fixes several bugs, including the issues some users reported with Intel and Toshiba solid-state drives (SSDs).
Security researchers from Eclypsium have detailed yesterday a new variation of the Spectre attack that can recover data stored inside a secure CPU area named the System Management Mode (SMM).
Almost all major OS vendors released security patches yesterday after a researcher discovered that some OS makers have misinterpreted an Intel CPU debug feature and left their systems open to attacks.
Intel announced yesterday at the RSA 2018 security conference several new security-focused technologies, among which is a feature that will let security products offload virus scanning operations to integrated graphics processors embedded with some Intel CPUs.
Intel has addressed a vulnerability in the configuration of several CPU series that allow an attacker to alter the behavior of the chip's SPI Flash memory âa mandatory component used during the boot-up process [1, 2, 3].
Intel has decided that instead of fixing three security bugs affecting the Intel Remote Keyboard Android app, it would be easier to discontinue the application altogether.
Intel released an update to the Meltdown and Spectre mitigation guide, revealing that it stopped working on mitigations for some processor series.
Apple is reportedly planning on ditching Intel and instead use their own chips in Mac computers beginning in 2020. This new initiative is called "Kalamata" and its goal is to make all Apple devices, including mobile and PCs, use the same chips for greater compatibility according to a new report by Bloomberg.
A team of academics from four US universities have discovered a new side-channel attack that takes advantage of the speculative execution feature in modern processors to recover data from users' CPUs.
Intel announced today that upcoming CPU models would include brand new hardware-level protections to prevent any future Meltdown and Spectre-like vulnerabilities.
Earlier this month, Microsoft announced it would be bundling Intel microcode (BIOS) updates meant to fix the graver version of the Spectre vulnerability as Windows Update packages made available via the Microsoft Update Catalog portal. Yesterday, Microsoft greatly expanded the number of such packages.