One of the world's lesser-known operating systems may actually be the most used OS in the world, according to new revelations made by Google's Linux experts.
Alex Matrosov, a security researcher for Cylance, has discovered several flaws in how some motherboard vendors implemented Intel's UEFI BIOS firmware into their products.
Researchers from Positive Technologies — a provider of enterprise security solutions — have found a way to disable the Intel Management Engine (ME), a much-hated component of Intel CPUs.
Intel released a new CPU model this week, the Intel Core i9 7900X, which is the latest model to feature a new cache architecture that hardware experts believe it will make exploitation of side-channel attacks a lot harder.
Some Intel CPU models are affected by a bug that crashes computers when a certain sequence of operations are being processed.
Security experts have discovered a method of bypassing Windows PatchGuard protections and hooking malicious code into the Windows kernel, which allows an attacker to plant rootkits on systems previously thought to be impregnable.
Microsoft's security team has come across a malware family that uses Intel's Active Management Technology (AMT) Serial-over-LAN (SOL) interface as a file transfer tool.
Intel's security team released a series of patches yesterday that fix a remote code execution (RCE) bug found in the Intel Management Engine (ME).
An unpatched bug in the firmware of Intel Puma 6 chipsets — used within several models of gigabit cable modems — is causing latency issues, and may also be used to knock devices offline via a gentle packet stream.
In a research paper published at the end of February, a team of five scientists from the Graz University of Technology has described a novel method of leaking data from SGX enclaves, a secure environment created by Intel CPUs for storing sensitive information for each process, such as encryption keys, passwords, and other.
Intel Security, soon to be rebranded as McAfee again, released on Wednesday a scanner that can identify hidden EFI firmware rootkits.
Attackers with access to a device can take control over a target's computer and bypass all local security systems by abusing a hardware debugging interface included with Intel CPUs, which in recent years has become accessible via an external USB 3.0 port.