Researchers unveil novel attack methods targeting Intel’s conditional branch predictor

Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use. The multi-university and industry researc… Continue reading Researchers unveil novel attack methods targeting Intel’s conditional branch predictor

Apple unveils advanced M3 chips for iMac and MacBook

Twas the night before Halloween, and Apple held a “spooky” event to announce some “scary fast” new products. The company unveiled its next generation chips, the M3 family, as well as the first iMacs and MacBooks that will feature them.Continue ReadingC… Continue reading Apple unveils advanced M3 chips for iMac and MacBook

As biohacking evolves, how vulnerable are we to cyber threats?

Can our bodies be hacked? The answer may be yes, in that anyone can implant a chip under the skin and these devices do not usually use secure technologies, according to Entelgy. However, despite more than a decade of talk about biohacking, implantable … Continue reading As biohacking evolves, how vulnerable are we to cyber threats?

Intel Responds to ‘Downfall’ Attack with Firmware Updates, Urges Mitigation

By Habiba Rashid
New Intel Processor Vulnerability “Downfall” Discovered: Threats to Data Security Amplify
This is a post from HackRead.com Read the original post: Intel Responds to ‘Downfall’ Attack with Firmware Updates, Urges Mitigation
Continue reading Intel Responds to ‘Downfall’ Attack with Firmware Updates, Urges Mitigation

Samsung, Vivo, Google phones open to remote compromise without user interaction

Several vulnerabilities in Samsung’s Exynos chipsets may allow attackers to remotely compromise specific Samsung Galaxy, Vivo and Google Pixel mobile phones with no user interaction. “With limited additional research and development, we believe t… Continue reading Samsung, Vivo, Google phones open to remote compromise without user interaction