Tag Archives: Intel
[German]Microsoft and Google have jointly disclosed a new CPU vulnerability on May 21, 2018. This vulnerability is comparable to the Meltdown and Spectre weaknesses discovered at the beginning of the year.
[German]Intel has stopped developing microcode updates to close the meltdown vulnerability for older CPUs. This can be seen in the latest Intel Microcode Update Guidance revision.
[German]Intel began rolling out microcode updates against meltdown and spectre attacks on its Ivy Bridge and Sandy Bridge family of processors a few days ago to OEMs. Here is an overview of the microcode updates that are now available.
[German]Intel released another batch of microcode updates (to OEMs) to close the Spectre V2 vulnerability for 6th, 7th and 8th generation Intel CPUs.
[German]Microsoft starts rolling out an out-of-band update to mitigate (fix) the Intel CPU vulnerability bug within Windows. Currently the update for Windows 10 is available, patches for Windows 7 and Windows 8.1 as well as the server counterparts will follow.
[German]A design flaw in existing Intel x86 CPUs seems to have serious implications for all operating systems running on these CPUs. The Linux kernel has already been patched. But what about Windows and other operating systems running on these CPUs?
On Mai 1, 2017 Intel disclosed the AMT vulnerability (INTEL-SA-00075), without publishing details. Security Researcher from Tenable has analyzed this vulnerability.
[German]Intel platforms from Nehalem to Kaby Lake has a critical vulnerability. Attackers can remotely access an exploitable elevation of privilege security hole. While no consumer systems are affected, Intel and it’s OEMs ships a firmware update.
[German]Microsoft has released since December 2016 several INTEL driver updates named as INTEL – System – <date> <version> (for instance INTEL – System – 6/28/2016). All packages are declared as optional updates for Windows 7 SP1 and Windows 8.1, and … Continue reading