Candlelites

Everything from Everywhere

intel tried desperately to change the subject from spectre and meltdown at ces - Search

intel tried desperately to change the subject from spectre and meltdown at ces Searched between all the resources and sites across the web. To view the full text news click on the links searched. All links are displayed with the source site.



intel tried desperately to change the subject from spectre and meltdown at ces


intel had a bad week last week.it was so bad that the chip maker has to be thrilled to have ces, the massive consumer technology show going on this week in las vegas, as a way to change the subject and focus on the other work they are doing.for starters, ceo brian krzanich had to deal with the elephant in the room at the company keynote on monday. spectre and meltdown patches were coming to 90 percent of the company’s affected chips by next week. that was good news for a company under siege for what my colleague ingrid lunden described without exaggeration as “…perhaps its biggest security scare in its history.”it didn’t help matters when intel’s patch proved buggy and caused some systems to reboot.in case you don’t know what that trouble was about, it began last week when the register, a






intel ceo gives update on meltdown, spectre cpu flaws at ces 2018


today’s topics include intel ceo brian krzanich addressing the meltdown and spectre cpu flaws at the consumer electronics show; microsoft updating its edge and internet explorer 11 browsers in response to those flaws; a former google employee suing for alleged discrimination against white men; and intel unveiling its “tangle lake” 49-qubit quantum chip at ces.intel ceo brian krzanich used the opening of his consumer electronics show keynote in las vegas on jan. 8 to publicly comment on the recently disclosed meltdown and spectre security vulnerabilities that impact the majority of the world's cpus.intel has been busy over the past week making firmware updates available, krzanich said, adding that "the primary focus of our decisions and our discussions have been to keep our customers' data






meltdown and spectre security vulnerabilities reveal cpu risks


after a rollercoaster day of speculation on jan. 3 about a severe intel chip flaw, google's project zero research team revealed later that same day details about the cpu vulnerabilities.the cpu flaws have been branded as meltdown and spectre and have widespread impact across different silicon, operating system, browser and cloud vendors. the meltdown flaw, identified as cve-2017-5754, affects intel cpus. spectre, known as cve-2017-5753 and cve-2017-5715, impacts all modern processors, including ones from intel, advanced micro devices and arm."meltdown breaks the mechanism that keeps applications from accessing arbitrary system memory, consequently, applications can access system memory," the meltdown attack advisory states. "spectre tricks other applications into accessing arbitrary locati






meltdown and spectre security vulnerabilities reveal cpu risks


after a rollercoaster day of speculation about a severe intel chip flaw, google's project zero research team revealed late day on jan.3 what the actual cpu vulnerabilities were all about.the cpu flaws have been branded as meltdown and spectre and have widespread impact across different silicon, operating system, browser and cloud vendors. the meltdown flaw impacts intel cpus and is also identified as cve-2017-5754. spectre is also known as cve-2017-5753 and cve-2017-5715 and impacts all modern processors including intel, amd and arm."meltdown breaks the mechanism that keeps applications from accessing arbitrary system memory, consequently, applications can access system memory," the meltdown attack advisory states. "spectre tricks other applications into accessing arbitrary locations in th






intel ceo comments on meltdown and spectre as patching continues


intel ceo brian krzanich used the opening of his consumer electronics show keynote in las vegas on jan. 8 to publicly comment on the recently disclosed meltdown and spectre security vulnerabilities that impact the majority of the world's cpus.jan. 9 was originally intended to be the day that the meltdown and spectre cpu flaws were to be publicly disclosed, but media speculation led to a jan. 3 disclosure of the critical flaws."the collaboration among so many companies to address this industrywide issue across several different processor architectures has been truly remarkable," krzanich said during his keynote. "security is job no. 1 for intel and our industry, so the primary focus of our decisions and our discussions have been to keep our customers' data safe."further readingthe meltdown






essential phone releases meltdown and spectre fixes


essential confirmed on twitter that it is rolling out fixes for the meltdown and spectre security flaws as part of the january security updates for the essential phone. these will be available to those running the current stable release and not to those on the oreo beta release. however, the final oreo release will include these fixes. essential did not comment on when the final oreo update will be released.meltdown and spectre are names of two major security flaws that were uncovered recently. both are techniques that can allow a user process to read kernel memory and access sensitive information. meltdown largely affects intel x86 processors from the last decade or so and some arm-based processors. spectre affects almost all modern processors. companies have already started issuing patch






meltdown and spectre cpu vulnerabilities: here's what you need to know


researchers at project zero, google’s cyber-security arm, have discovered a pair of vulnerabilities in some of the most popular cpus used in pcs, macs and handheld devices. the meltdown and spectre security flaws have been described by some commentators as some of the “worst ever” security threats, affecting millions of users all over the world.computer manufacturers have reacted quickly, however, and there are already fixes available for many devices. the flaws were originally discovered in mid-2017, and google has been working in private with various firms to release the necessary security fixes. in this article we’ll talk you through what this latest threat means and how you can protect yourself from it.related: 7 of the best secure email services for better privacywhat are meltdown and






more details emerge about meltdown and spectre cpu flaws


today’s topics include a pair of flaws found in most modern cpus; a google apps script vulnerability exposing malware risks; google introducing a new preemptible gpu compute option for cloud customers; and a microsoft and adaptive biotechnologies partnership in ai-enabled immunology.google's project zero last week revealed details about a pair of severe intel chip flaws, which have been branded as meltdown and spectre, and have widespread impact across different silicon, operating system, browser and cloud vendors.the meltdown flaw affects intel cpus, and spectre impacts all modern processors, including ones from intel, advanced micro devices and arm. "meltdown breaks the mechanism that keeps applications from accessing arbitrary system memory; consequently, applications can access system






vendors continues to deal with meltdown and spectre cpu vulnerability issues


more than week after security researchers first publicly revealed the meltdown and spectre cpu vulnerabilities, vendors are continuing to deal with the impact and are still issuing patches.the initial speculation about the cpu vulnerabilities was that they only impacted intel cpus. as it turns out, both amd and arm cpus are also impacted, though to a more limited extent. on jan. 11, amd announced that it would be issuing processor microcode updates to help provide an additional degree of protection.while amd is now joining the patching fray, intel continues to deal with issues related to patches it has already made available, including flaws that have caused systems to reboot. further readingamd patchesthe meltdown and spectre flaws are actually three different vulnerabilities, with the me






vendors continue dealing with meltdown, spectre fallout


more than week after security researchers first publicly revealed the meltdown and spectre cpu vulnerabilities, vendors are continuing to deal with the impact and are issuing patches.the initial speculation about the cpu vulnerabilities was that they only impacted intel cpus. as it turns out, amd and arm cpus are also impacted, though to a more limited extent. on jan. 11, amd announced that it would issue processor microcode updates to help provide an additional degree of protection.while amd is now joining the patching fray, intel continues to deal with issues related to patches it has already made available, including flaws that have caused systems to reboot. further readingamd patchesthe meltdown and spectre flaws are actually three different vulnerabilities with the meltdown flaw ident






apple releases ios and macos updates with a mitigation for spectre


apple just released ios 11.2.2 with some safari and webkit improvements to mitigate the spectre vulnerability. macos is also receiving an update. it’s a supplemental update to macos high sierra 10.13.2 and it includes the same fix.as always, you should update your devices with the latest security patches. in this case, meltdown and spectre are serious vulnerabilities. with meltdown, a malicious application running on an unpatched device can read the unencrypted kernel memory. you don’t want anyone to grab your password and private encryption keys.meltdown was already addressed in previous updates. ios 11.2, macos 10.13.2 and tvos 11.2 already included mitigations for meltdown. apple watch chips aren’t affected by meltdown.spectre isn’t as serious as it only breaks the isolation between mul






macs and ios devices also affected by meltdown and spectre vulnerabilities


yesterday it was revealed that the large majority of the devices that we use powered by intel, amd and arm processors are vulnerable to attacks via two security flaws - named meltdown and spectre.these are serious vulnerabilities and the whole industry is responding accordingly. today apple confirmed that all mac systems and ios devices are also affected by the meltdown and spectre vulnerabilities:all mac systems and ios devices are affected, but there are no known exploits impacting customers at this time.it then went on to reassure customers by confirming that it had started to mitigate against these flaws in its portfolio of operating systems:apple has already released mitigations in ios 11.2, macos 10.13.2, and tvos 11.2 to help defend against meltdown.as with many security flaws, it's






meltdown and spectre: all mac devices affected says apple


image copyrightgetty imagesapple has said that all iphones, ipads and mac computers are affected by two major flaws in computer chips.it emerged this week that tech companies have been racing to fix the meltdown and spectre bugs, that could allow hackers to steal data.apple said it had already released some patches but there was no evidence that the vulnerability had been exploited.but it advised only downloading software from trusted sources to avoid "malicious" apps. mac users have often believed that their devices and operating systems are less vulnerable to security issues than, for example android phones or computers running microsoft systems. media playback is unsupported on your devicemedia captionwatch: chip hacks explainedbut the meltdown and spectre flaws are found in all modern






meltdown and spectre: all mac devices affected, says apple


image copyrightgetty imagesapple has said that all iphones, ipads and mac computers are affected by two major flaws in computer chips.it emerged this week that tech companies have been racing to fix the meltdown and spectre bugs, that could allow hackers to steal data.apple said it had already released some patches but there was no evidence that the vulnerability had been exploited.but it advised downloading software only from trusted sources to avoid "malicious" apps. mac users have often believed that their devices and operating systems are less vulnerable to security issues than, for example android phones or computers running microsoft systems. media playback is unsupported on your devicemedia captionwatch: chip hacks explainedbut the meltdown and spectre flaws are found in all modern






apple says meltdown and spectre flaws affect ‘all mac systems and ios devices,’


apple isn’t immune to meltdown and spectre, the major bugs in basic computing architecture that were announced yesterday to widespread amazement and horror. in an announcement, the company said that “all mac systems and ios devices are affected,” which sounds right, but that mitigations are either already in place or on the way.if you’re still not clear on the whole debacle, i went into detail on it yesterday. basically, a couple of tricks processors have been using for decades turn out to have a couple extremely serious vulnerabilities and could be used to reveal all kinds of protected data to malicious actors.fortunately, as apple puts it, “there are no known exploits impacting customers at this time.” but you better believe it won’t stay that way for long. to prevent being the lucky fir






intel ceo: meltdown and spectre patches will come to 90%+ of chips in the next w


with the microchip processing industry facing perhaps its biggest security scare in its history, the ceo of one of the world’s biggest chipmakers, brian krzanich of intel, took to the stage at a keynote at ces to say a few words about the news before launching into his planned announcements covering areas like automotive, ai and entertainment.“i want to thank the industry for coming together to address the recent security, industry-wide issue. security is job number one for intel and our industry,” he said. “the primary focus for us has to keep our customer data safe.”he said that intel had not  received any information that any data has been compromised on its chips to date. “we are working tirelessly to make sure it stays that way,” he added.he also said that intel expects to issue updat






what you need to do because of flaws in computer chips


hackers can exploit two major flaws, called meltdown and spectre, in microprocessors running virtually all machines on earth. here’s what you need to do now.on wednesday, a group of security experts revealed two security flaws that affect nearly all microprocessors, the digital brains of the world’s computers. these flaws, called meltdown and spectre, could allow hackers to lift passwords, photos, documents and other data from smartphones, pcs and the cloud computing services that many businesses rely on.some of the world’s largest tech companies have been working on fixes for these problems. but the researchers who discovered the flaws said one of them, spectre, is not completely fixable. “it is a fundamental flaw in the way processors have been built over the last decades,” said paul koc






pc chip talk conspicuously absent from intel keynote at ces 2018


it’s hard to believe the ceo of intel could give a keynote speech without mentioning its latest cpus models to power the world’s desktop and notebooks pcs.brian krzanich’s ces 2018 keynote in las vegas focused on how intel is helping to power a new generation of data-driven services, drones and self-driving cars that the company is counting on to drive its future growth.the biggest surprise came near the end of the january 8 evening event when krzanich invited the ceo of volocopter to show off the company’s autonomous multi-rotor helicopter. first the audience saw a video of krzanich himself flying inside the volocopter in a hanger in germany. then the plane briefly flew solo inside the auditorium, though krzanich said safety concerns given the confined venue limited how much it could do d






intel is having reboot issues with its spectre-meltdown patches


it hasn’t been a fun time to be intel. last week the company revealed two chip vulnerabilities that have come to be known as spectre and meltdown and have been rocking the entire chip industry ever since (not just intel). this week the company issued some patches to rectify the problem. today, word leaked that some companies were having a reboot issue after installing them. a bad week just got worse.the company admitted as much in a blog post penned by navin shenoy, executive vice president and general manager of the data center group at intel.“we have received reports from a few customers of higher system reboots after applying firmware updates. specifically, these systems are running intel broadwell and haswell cpus for both client and data center,” shenoy wrote.he added, “if this requir






fcc issues final version of order eliminating net neutrality rules


after meltdown and spectre revelation, questions arise about timing of intel ceo’s stock sales2 hours ago | catherine shu






microsoft issues windows 10 patch for 'meltdown' processor bug


soon after returning from the holidays, it professionals were confronted with a severe memory-isolation flaw in intel processors called meltdown. present in just about every processor shipped by the chipmaker since 1995, the flaw can be used to unravel some of the most critical security mechanisms used in operating system software."meltdown breaks the most fundamental isolation between user applications and the operating system," cautions the meltdown security advisory. "this attack allows a program to access the memory, and thus also the secrets, of other programs and the operating system."affected devices run the gamut, from laptops to high-end cloud servers, with the exception of systems with pre-2013 itanium and atom processors. the same advisory warns of spectre, a similar memory-isol






meltdown and spectre: all macs, iphones and ipads affected


image copyrightgetty imagesimage caption only iphones and macs running the very latest operating system software are safe from the meltdown bug apple has said that all iphones, ipads and mac computers are affected by two major flaws in computer chips.it emerged this week that tech companies have been racing to fix the meltdown and spectre bugs, that could allow hackers to steal data.billions of pcs, smartphones and tablets around the world are affected - apple has now confirmed its products are too.the firm has released some patches to mitigate the meltdown flaw.it said there was no evidence that either vulnerability had been exploited yet, but advised downloading software only from trusted sources to avoid "malicious" apps. mac users have often believed that their devices and operating sy






meltdown and spectre: all macs, iphones and ipads affected


image copyrightgetty imagesimage caption only iphones and macs running the very latest operating system software are safe from the meltdown bug apple has said that all iphones, ipads and mac computers are affected by two major flaws in computer chips.it emerged this week that tech companies have been racing to fix the meltdown and spectre bugs, that could allow hackers to steal data.apple said it had already released some patches but there was no evidence that the vulnerability had been exploited.but it advised downloading software only from trusted sources to avoid "malicious" apps. mac users have often believed that their devices and operating systems are less vulnerable to security issues than, for example android phones or computers running microsoft systems. media playback is unsuppor






ces 2018: intel to make flawed chips safe in a week


image copyrightintelimage caption intel's chief executive took a few minutes to address news of flaws in the firm's chips at ces intel's chief executive has said software fixes to address the recently discovered meltdown and spectre bugs in microchips would be released in the next few days.brian krzanich was speaking at the beginning of his keynote speech at the ces trade show event in las vegas.he said 90% of processors and products from the past five years would be patched "within a week".intel has faced scrutiny after details of the flaws emerged last week.meltdown and spectre are unusual in that they are both problems with a fundamental component inside modern computers - the central processing unit (cpu).they allow attackers to potentially access sensitive data held in the chip's memo






how to find fixes for the meltdown, spector chip vulnerabilities


the first thing you have to know in regards to the two processor vulnerabilities affecting intel and other makers is that there are currently no exploits out there in the malware world right now. this means that if you can’t find a fix for the spectre or meltdown vulnerabilities for your organization’s computers, you don’t have to panic—yet. but that doesn’t mean you shouldn’t start working on a permanent solution to the problem, because it’s very real, and eventually it’s likely that someone, somewhere, will find a way to use the vulnerabilities to hack into something. both of the vulnerabilities are present in intel chips and have been since 1995. however, it would be wrong to consider either a bug or a design flaw, because they used the features behind the vulnerabilities to enhance per






'it can't be true': inside the semiconductor industry's meltdown


it was late november and former intel engineer thomas prescher was enjoying beers and burgers with friends in dresden, germany, when the conversation turned, ominously, to semiconductors.months earlier, cybersecurity researcher anders fogh had posted a blog suggesting a possible way to hack into chips powering most of the world's computers, and the friends spent part of the evening trying to make sense of it. the idea nagged at prescher, so when he got home he fired up his desktop computer and set about putting the theory into practice. at 2 a.m., a breakthrough: he'd strung together code that reinforced fogh's idea and suggested there was something seriously wrong."my immediate reaction was, 'it can't be true, it can't be true,'" prescher said.last week, his worst fears were proved right






apple outs ios 11.2.2 and macos 10.13.2 supplemental update to mitigate spectre


apple has already confirmed that macs and ios devices are affected by the recently disclosed meltdown and spectre vulnerabilities that have taken the tech world by storm in the past few days. and while it's already applied patches to mitigate meltdown (in ios 11.2 and macos 10.13.2), today it's time for a couple of software updates to go out in order to address spectre.ios 11.2.2 and a supplemental update for macos high sierra 10.13.2 have been released with that exact aim in mind. both of these are already available to download and install onto supported devices. safari has been bumped to 11.0.2 on macos sierra 10.12.6 and os x el capitan 10.11.6 for the same purpose.it's important to note that spectre is being mitigated, not fixed, with these safari-based workarounds, because it's a prob






microsoft updates edge and ie in response to meltdown, spectre flaws


after the discovery of the meltdown and spectre processor flaws, microsoft edge and internet explorer 11 will act a little differently, even if it's not obvious to users. as part of microsoft's response to the cpu vulnerabilities that have put much of the it industry on edge, the software maker is changing how its web browsers process web applications and sites.on vulnerable systems, meltdown and spectre increase the risk of side-channel attacks triggered by malicious web content, potentially allowing attackers to access private information outside the scope of a given website. one way that microsoft is mitigating this risk is by removing support for the sharedarraybuffer javascript optimization that was introduced in the windows 10 fall creators update. sharedarraybuffer may return after






essential phone getting january patch and spectre/meltdown fixes


essential has started pushing out a new update to its ph-1 smartphone. carrying a build number of nmj88c, it's mainly a security update that brings along android fixes for the month of january.the security patch also includes fixes for the recently-uncovered spectre and meltdown security flaws, making it all the more important to install the update as soon as its available for your device.meanwhile, while replying to a user query in the comments section of the aforementioned tweet, the company also confirmed that oreo (stable) for the ph-1 is coming soon. source






after meltdown and spectre revelation, questions arise about timing of intel ceo


the timing of intel ceo brian krzanich’s large sale of shares in november is raising questions because a securities and exchange commission filing appeared to show that the transactions were planned after the company was informed about the meltdown and spectre bugs, but before they were made public.the shares were sold in accordance with a sec rule 10b5-1 plan, which is intended to prevent illegal insider trading by allowing company executives to create predetermined, automatic selling plans. the form 4 filed by krzanich, however, state that the plan was adopted on october 30, 2017—months after google says it informed intel and other affected companies about the bugs in june, which in turn were only made public this week in reports by the register and other media.an intel spokesperson told






after meltdown and spectre revelation, questions arise about timing of intel ceo


the timing of intel ceo brian krzanich’s large sale of shares in november is raising questions because a securities and exchange commission filing appeared to show that the transactions were planned after the company was informed about the meltdown and spectre bugs, but before they were made public.the shares were sold in accordance with a sec rule 10b5-1 plan, which is intended to prevent illegal insider trading by allowing company executives to create predetermined, automatic selling plans. the form 4 filed by krzanich, however, state that the plan was adopted on october 30, 2017—months after google says it informed intel and other affected companies about the bugs in june, which in turn were only made public this week in reports by the register and other media.an intel spokesperson told






watch intel ceo brian krzanich’s ces keynote live right here


all eyes are on intel ceo brian krzanich today. while the issue isn’t limited to intel chips, the company has been under the spotlight for the meltdown and spectre vulnerabilities.krzanich sold quite a few intel shares back in november. and let’s just say that the timing feels a bit weird. let’s hear what he has to say on the vulnerabilities.today’s keynote is also going to be a good opportunity to get an early look at future intel products. for example, intel realized that building cpus and building gpus are two different jobs. that’s why the company has partnered with its archenemy amd to build core i5 and core i7 processors with integrated amd radeon rx vega m gpus. this is a great example of asymmetric competition, and also a great way to compete with nvidia.while intel also owns mobil






check if your windows is protected from meltdown and spectre


microsoft has already released emergency updates to patch the meltdown and spectre bugs. however, considering the complexity of the bugs and due to some anti-virus software, your windows system may or may not be fully patched. though the regular windows update screen won’t give you any details about the patch level, microsoft published a simple powershell script that lets you know if your windows system is fully patched or not. the following instructions show how to use it to check your system.update windowsbefore checking your system, i would recommend you check and update windows. to update windows, open the settings app by pressing the keyboard shortcut win + i and select “update and security.”now, click on the button “check for updates” and install any available updates. once you are d






google claims its spectre and meltdown mitigation results in no performance degr


it’s been a long week since we first learned about the now infamous spectre and meltdown chip vulnerabilities. one of the issues with mitigating the danger these vulnerabilities pose is that they could result in serious performance degradation. in a blog post today, google claimed their solutions resulted in no performance degradation across the different mitigation techniques they have developed.the company’s project zero team discovered the chip vulnerabilities last year as it outlined in a blog post last week. as google explained it, there are three variants here. the first two are known as spectre and the third as meltdown. the spooky nicknames just add to the drama of this entire event.every chip has a protected area which prevents one application from seeing what another is doing. th






kernel panic! what are meltdown and spectre, the bugs affecting nearly every com


advertisement if you’re confused by the avalanche of early reports, denials, and conflicting statements about the massive security issues announced today, don’t worry — you’re far from the only one. here’s what you need to know about meltdown and spectre, the two huge bugs that affect practically every computer and device out there.what are these flaws?short answer: bugs at a fundamental level that allow critical information stored deep inside computer systems to be exposed.security researchers released official documentation — complete with nicknames and logos —  of two major flaws found in nearly all modern central processing units, or cpus.it’s not a physical problem with the cpus themselves, or a plain software bug you might find in an application like word or chrome. it’s in between,






microsoft meltdown patch causing blue screen of death on amd pcs


meltdown and spectre are already causing trouble, even if there's no evidence that cyber-attackers have weaponized the critical processor flaws.on jan. 3, the google project zero team of security researchers published its findings on the two cpu vulnerabilities that collectively affect most modern processors from intel, advanced micro devices (amd) and arm. microsoft was quick to issue emergency patches, but some hardware operating system combinations are proving to be problematic for some users who followed the urgent recommendations of cyber-security experts and updated their systems before meltdown and spectre attacks surface and cause serious data breaches."these vulnerabilities allow malware to read the computer's memory, effectively giving access to sensitive user data such as passwo






how to use zarp for penetration testing


image: istock every network administrator knows that security is of the utmost importance. to that end, most admins understand that penetration testing is a necessity for the discovery of network issues. one very powerful pen testing tool is zarp.more about it securityzarp is a framework that offers the following types of tests:poisonersdenial of servicesniffersscannersservicesparameterattackswith this one framework, you can do considerable penetration testing. i'll walk you through the installation and usage of zarp. once installed, i'll explain how to issue a tcp syn dos attack on a specific ip address so you can see how the machine handles the attack.see: network security policy (tech pro research)installing zarpthe best way to run zarp is from a pen testing distribution, such as cybor