Is it possible to debunk Intel Management Engine conspiracy theories using a data usage monitor device?

If there would be any backdoor in recent Intel CPU’s, then it should send and receive data secretly.

Isn’t it possible to easily debunk this conspiracy theory by implementing a third physical device between the computer and the router to … Continue reading Is it possible to debunk Intel Management Engine conspiracy theories using a data usage monitor device?

Why direct-memory attacks on laptops just won’t go away

A dizzying array of organizations can be involved in the production of a laptop. One body puts out the specifications for the firmware, another vendor writes it and sells it to the manufacturer, and then another company makes sure it works with the device’s operating system. While there are exceptions — Apple controls more of these processes in producing Macs — the overall complexity of the laptop industry’s supply chain makes security harder. One vendor builds protections into a laptop, but if another firm doesn’t configure them properly, the chance that the machine is vulnerable to hacking grows considerably. New research from hardware security company Eclypsium shows why this challenge is so enduring. Eclypsium’s team of former white-hat hackers at Intel Corp. found two vulnerabilities in memory features of modern, “enterprise-class” HP and Dell laptops that could allow a skilled hacker to take control of the kernel, the computer’s core functionality, […]

The post Why direct-memory attacks on laptops just won’t go away appeared first on CyberScoop.

Continue reading Why direct-memory attacks on laptops just won’t go away

Vivin Nets Thousands of Dollars Using Cryptomining Malware

A newly discovered threat actor named Vivin is raking in Monero from cryptomining malware, showing that this type of attack isn’t going away anytime soon. Continue reading Vivin Nets Thousands of Dollars Using Cryptomining Malware

This CPU Has Only One Instruction

Most of us will be familiar at some level with the operation of a basic CPU, usually through exposure to microprocessors of the type that find their way into our projects. We can look at its internal block diagram and get how it works, see the registers and ALU, follow …read more

Continue reading This CPU Has Only One Instruction

Intel releases updates to plug TPM-FAIL flaws, foil ZombieLoad v2 attacks

Intel’s Patch Tuesday releases are rarely so salient as those pushed out this month: the semiconductor chip manufacturer has patched a slew of high-profile vulnerabilities in their chips and drivers. TPM-FAIL TPM-FAIL is a name given to vulnerabi… Continue reading Intel releases updates to plug TPM-FAIL flaws, foil ZombieLoad v2 attacks

Proprietary Fan Blows, Gets PWM Upgrade

Proprietary components are the bane of anyone who dares to try and repair their own hardware. Nonstandard sizes, lack of labeling or documentation, and unavailable spare parts are all par for the course. [Jason] was unlucky enough to have an older Dell computer with a broken, and proprietary, cooling fan …read more

Continue reading Proprietary Fan Blows, Gets PWM Upgrade