Researchers Found Another Major Security Flaw in Intel CPUs

477461-intel-6th-gen-chips

Security researchers have found another flaw in Intel CPUs — this time related to Intel Active Management Technology. Once again, this flaw can be leveraged to take complete control of a system, regardless of any security measures the user might employ.

The post Researchers Found Another Major Security Flaw in Intel CPUs appeared first on ExtremeTech.

The original article can be found here: https://www.extremetech.com/computing/262031-researchers-found-another-major-security-flaw-intel-cpus?source=Computing

Powered by WPeMatico

How to protect your devices against Meltdown, Spectre bugs

Revelations that security flaws in chips powering PCs, laptops, servers, phones, and other devices have gone unnoticed for years have whipped bug fixers and security experts into a frenzy this week.

The original article can be found here: http://www.foxnews.com/tech/2018/01/05/how-to-protect-your-devices-against-meltdown-spectre-bugs.html

Powered by WPeMatico

Spectre, Meltdown: Critical CPU Security Flaws Explained

Security cryptography

The security flaws everyone’s been rushing to patch have names now: Meltdown and Spectre. There’s good reason everyone’s been rushing to patch things.

The post Spectre, Meltdown: Critical CPU Security Flaws Explained appeared first on ExtremeTech.

The original article can be found here: https://www.extremetech.com/computing/261439-spectre-meltdown-new-critical-security-flaws-explored-explained?source=Computing

Powered by WPeMatico

Offsetting Asymmetry With Automation


In the security world, there is a truism that defense is harder than offense because it’s an asymmetric playing field. The bad guys need only find one path into an environment — one place where everything hasn’t been done perfectly — while those charged with securing that environment need to protect against intrusions everywhere. The asymmetry is apparent in other respects as well. For example, a large percentage of a company’s staff members may go home at night, but attackers can operate from wherever, whenever.

The original article can be found here: http://www.ecommercetimes.com/story/84970.html?rss=1

Powered by WPeMatico

Intel Patches Major Flaws in the Intel Management Engine

8th Gen Intel Core S-series Die

Intel has released a new set of updates for the Intel Management Engine. There are multiple significant security vulnerabilities in the engine that this should address, once OEMs make fixes available.

The post Intel Patches Major Flaws in the Intel Management Engine appeared first on ExtremeTech.

The original article can be found here: https://www.extremetech.com/computing/259426-intel-patches-major-flaws-intel-management-engine?source=Computing

Powered by WPeMatico

Twitter revamps internal security after rogue employee deactivated Trump's account

Twitter says that it has revamped its internal security after a rogue employee briefly deactivated President Donald Trump’s Twitter account.

The original article can be found here: http://www.foxnews.com/tech/2017/11/03/twitter-revamps-internal-security-after-rogue-employee-deactivated-trumps-account.html

Powered by WPeMatico

Twitter security slammed after rogue employee deactivates Trump's account

Twitter’s internal security is in the spotlight after a rogue employee briefly deactivated President Donald Trump’s account on Thursday.

The original article can be found here: http://www.foxnews.com/tech/2017/11/03/twitter-security-slammed-after-rogue-employee-deactivates-trumps-account.html

Powered by WPeMatico

Apple Face ID: Tech professionals unsure about security benefits, research says

IT professionals are unsure about the security benefits of Apple’s new Face ID technology, which can be used to unlock the tech giant’s new iPhone X.

The original article can be found here: http://www.foxnews.com/tech/2017/11/02/apple-face-id-tech-professionals-unsure-about-security-benefits-research-says.html

Powered by WPeMatico

Kaspersky Lab says it 'inadvertently' downloaded NSA hacking tools

Embattled security firm Kaspersky Lab said its antivirus software did download secret hacking tools from a US computer back in 2014, but deleted them after realizing the data was classified.

The original article can be found here: http://www.foxnews.com/tech/2017/10/26/kaspersky-lab-says-it-inadvertently-downloaded-nsa-hacking-tools.html

Powered by WPeMatico

Post-Equifax Breach, It’s Time for a Digital Universal ID

encryption

In the digital age, why are we still using social security numbers for identification?

The post Post-Equifax Breach, It’s Time for a Digital Universal ID appeared first on ExtremeTech.

The original article can be found here: https://www.extremetech.com/internet/256934-post-equifax-hack-time-digital-universal-id?source=Computing

Powered by WPeMatico

Lenovo Faces No Significant Penalty for Security-Destroying Superfish Debacle

Lenovo

Lenovo has settled the case brought by the FTC and 32 states over its Superfish software and the security it broke with its own lax practices. The company faces no significant penalty for its actions.

The post Lenovo Faces No Significant Penalty for Security-Destroying Superfish Debacle appeared first on ExtremeTech.

The original article can be found here: https://www.extremetech.com/computing/255086-lenovo-settlement-superfish?source=Computing

Powered by WPeMatico

Robot tax coming? San Francisco mulls option to help laid-off human workers

Security guard Eric Leon watches the Knightscope K5 security robot as it glides through the mall, charming shoppers with its blinking blue and white lights. The brawny automaton records video and sounds alerts. According to its maker, it deters mischief just by making the rounds.

The original article can be found here: http://www.foxnews.com/tech/2017/09/06/robot-tax-coming-san-francisco-mulls-option-to-help-laid-off-human-workers.html

Powered by WPeMatico

Tor Amps Up Its Mobile Browser Support

Tor and The Guardian Project have teamed up to add new UI elements and security data to the already in-development Orfox browser.

The post Tor Amps Up Its Mobile Browser Support appeared first on ExtremeTech.

The original article can be found here: https://www.extremetech.com/mobile/255057-tor-project-adds-new-features-mobile-browser-support?source=Computing

Powered by WPeMatico

Russian cybersecurity firm Kaspersky Lab a 'danger' to US security, senator warns

Prominent cybersecurity firm Kaspersky Lab poses a danger to U.S. security, warns Democratic Sen. Jeanne Shaheen, who is pushing to prohibit the federal government from using the Moscow-based company’s products.

The original article can be found here: http://www.foxnews.com/tech/2017/09/05/russian-cybersecurity-firm-kaspersky-lab-danger-to-us-security-senator-warns.html

Powered by WPeMatico

'Gaping security holes' in millions of AT&T modems, researchers claim

A security research firm claims to have found “gaping security flaws” in most AT&T U-verse cable modems — you know, the type used by most every AT&T customer to get online.

The original article can be found here: http://www.foxnews.com/tech/2017/09/05/gaping-security-holes-in-millions-at-t-modems-researchers-claim.html

Powered by WPeMatico

The War Room: Experiential Security Planning


Ask any security practitioner about ransomware nowadays, and chances are good you’ll get an earful. Recent outbreaks like Petya and WannaCry have left organizations around the world reeling, and statistics show that ransomware is on the rise generally. For example, 62 percent of participants surveyed for ISACA’s recent “Global State of Cybersecurity” survey experienced a ransomware attack in 2016, and 53 percent had a formal process to deal with it. While ransomware is already a big deal, it is set to become an even bigger deal down the road.

The original article can be found here: http://www.ecommercetimes.com/story/84738.html?rss=1

Powered by WPeMatico