Intel Monday announced three new measures that will be implemented in a future chip designed to bake security into the hardware following last year's Spectre/Meltdown vulnerability.
Vulnerability could leave users with bricked systems. Intel has fixed a flaw that could prevent a system from booting, to cause it to operate in an unusual way, or execute arbitrary code during the system boot sequence.
Intel is instructing users of its remote keyboard to delete the app after a critical flaw was found and also the firm is halting Spectre fixes on older chips.
Intel is redesigning its chips in order to to combat Spectre and Meltdown attacks, also known as Project Zero Variant 1, 2, and 3.
Intel is stating the reason behind its decision to not inform industry organisations and the US federal government of crucial flaws in its processors is it was following established industry reporting standards.
In the US, the House Energy and Commerce Committee chairman expressed concern over reports that Intel informed Chinese companies about the Spectre/Meltdown vulnerabilities before it told US officials.
Intel is recommending that vendors and end users stop deploying the current version of its patch designed to fix the Spectre/Meltdown vulnerabilities that were discovered in most of the company's processors.
Insecure defaults in Intel AMT allow an intruder to completely bypass user and BIOS passwords and TPM and Bitlocker PINs to backdoor almost any corporate laptop in a matter of seconds.
Intel CEO Brian Krzanich's sale of Intel stock in November before security flaws in the chip became public is raising some eyebrows among regulatory and legal officials.
Security researchers have discovered a flaw in the AMD PSP (Platform Security Processor), which could enable hackers to execute code in a security module that stores data such as passwords, certificates, and encryption keys.
A reported chip flaw in Intel processors that has existed at least for the last 10 years allows software programs to access content in kernel memory and patching the bug.
A file-transfer mechanism that Microsoft describes as a feature rather than a bug is being exploited by the Platinum hacking group on targeted machines in south east Asia.
In Case You Missed It: Intel AMT bug; MS early disclosure spat; counter-terror expo; Kaspersky accused; Macron's DP.
A long-standing flaw in Intel's manageability firmware may date back 10 years and is trivial to exploit, so patch your devices now, says security researcher.
As Intel proceeds with plans to divest its majority stake in Intel Security, the chipmaker's security business unit, a lawsuit filed against Intel threatens to create challenges for the entity.
Plans are being hatched to prevent return-oriented programming attacks on memory flaws
Dark web has been offering various streaming services on the internet for cut rate prices cheaper than a monthly subscription
Intel Security's new report, "The Hidden Data Economy" reveals that hackers are advertising stolen information on YouTube and then selling it on common websites.
The report provides a recollection of threats from the last five years, GPU malware assessment and techniques for withdrawing data from corporate networks.