Intel
Innovative Encryption Solutions to Help Prevent Side Channel Attacks
Encryption is an essential element of effective cybersecurity and data protection. Only systems or individuals with the correct encryption keys are able to decipher and view the encrypted data. Of course, attackers ...
Intel Hardware CTF Competitions Drive Innovation for Next-Gen Secure Computing Platforms
The concept of capture the flag competitions goes back hundreds of years from a military perspective, and it has become a staple of hacking and cybersecurity exercises. The basic concept pits teams ...
BleedingTooth: Intel Discloses Early, Angering Linux Lovers
A Google researcher discovered a high-severity vulnerability in the Linux Bluetooth stack ...
BlindSide: Intel/AMD Speculation Bugs Under Microscope Again
Researchers have published frightening details on what they’re calling BlindSide, which relies on co-opting our old friend speculative execution ...
Intel Shares Security Insights in Unique Virtual Event
Virtual Panel Event Complete with Drinks, Snacks, and Trivia When the world gives you lemons, make lemonade. Many vendors did just that around the time of what would normally have been the ...
Intel Leak: 20GB of Secrets Just the Start, Says Perp
A large cache of confidential documents has been exfiltrated from Intel and leaked ...
Tom Garrison Discusses Preventing Exploits with Intel CET
TechSpective Podcast Episode 049 Malware is a massive problem that costs businesses around the world billions of dollars every year. Much of the effort to fight malware is a simple game of ...
Another Intel Speculative Execution Vulnerability
Remember Spectre and Meltdown? Back in early 2018, I wrote: Spectre and Meltdown are pretty catastrophic vulnerabilities, but they only affect the confidentiality of data. Now that they -- and the research ...
Microsoft Leans on Intel to power Azure Confidential Computing
Intel is a sponsor of TechSpective Data is the fuel that drives business, which is why it’s also a primary target. Protecting data has always been a challenge, but cloud computing, containers, ...
Attack Against PC Thunderbolt Port
The attack requires physical access to the computer, but it's pretty devastating: On Thunderbolt-enabled Windows or Linux PCs manufactured before 2019, his technique can bypass the login screen of a sleeping or ...

