AMD
Downfall, Inception Highlight the Challenges of Securing Hardware
The security vulnerabilities in Intel and AMD processors that could lead to hackers stealing passwords, encryption keys, and other sensitive information put a spotlight on the difficulty of securing CPUs. The news ...
Ransomware Detection Using Hardware
Computer processors get the final word when running programs. Can they judge bad code from good? Is ransomware detection using hardware possible? We look at Intel’s approach to improving ransomware detection. All ...
Retbleed: Spectre-BTI Family’s Newborn Strikes Intel, AMD
A new research has uncovered a unique attack tactic exploiting speculation execution to bypass the current defenses in the AMD and Intel CPUs. Harvesting Spectre-BTI attacks, the exploit initiates potential leakage of ...
AMD Latest Victim of RansomHouse Gang
It’s been a challenging couple of years for AMD. After the last few years of disruption and amid the global chip shortage, the company has been attacked by the RansomHouse Extortion Group, ...
Specter of Spectre is Back, in New Micro-Op Cache Vuln
It’s been three years, but now researchers have disclosed new attacks on speculative execution in Intel and AMD chips ...
BlindSide: Intel/AMD Speculation Bugs Under Microscope Again
Researchers have published frightening details on what they’re calling BlindSide, which relies on co-opting our old friend speculative execution ...
New AMD Processor Bug Breaks Encryption
AMD CPUs have yet another flaw: Researchers say they can steal private AES keys, leak kernel memory, set up covert cloud channels, and do other dirty, dark deeds ...
AMD Confirms Chip Flaws, Promises Fixes Soon
Chip maker AMD has confirmed the validity of flaws that a security firm recently claimed to have found in its processors and plans to release firmware patches in the coming weeks. A ...
AMD downplays CPU flaw discovery, says hackers would need admin rights anyway
Semiconductor giant AMD said today that attackers wouldn’t likely abuse the vulnerabilities recently found in its products: they would need administrative access, and that kind of access would allow for far more ...