Security

One of the key elements of building a processor is that designing a secure product involves reducing the ‘attack surface’ as much as possible: the fewer ways an attack can get in, the safer your product is. For the white knights of the security world, when a vulnerability is found, the process usually goes through a period of responsible disclosure, i.e. the issue is presented to the company, and they are often given a certain time to fix the issue (to help customers) before the full disclosure is made public (in case it might be swept under the rug). Using this method, a researcher at Google found a vulnerability in the way AMD’s EPYC processors provide Secure Encrypted Virtualization (SEV) which would allow an...

HP’s Endpoint Security Controller: More Details About A New Chip in HP Notebooks

One of HP’s key announcements this spring was its revamped security initiative for PCs that includes hardware, software, and deep learning-based approaches. The software and DL parts of the...

32 by Anton Shilov on 5/2/2019

HP’s Security Push: Sure Sense & Endpoint Security Controller

Antivirus software is getting more robust, but so does malware. In a bid to make its PCs more secure, HP is introducing a set of hardware and software-based methods...

6 by Anton Shilov on 4/17/2019

BlackBerry Acquires Cylance, Gets AI & ML Security Technology

BlackBerry Limited has announced that it had completed acquisition of Cylance, a company developing machine learning and artificial intelligence-based security technology. The move adds valuable IP and technologies to...

6 by Anton Shilov on 2/25/2019

Dell EMC’s Older PowerEdge iDRAC BMC Vulnerable to Firmware Replacement Attack

Every modern server is equipped with a baseboard management controller (BMC) that enables its remote management. A BMC is essentially a computer within a computer with its own memory...

2 by Anton Shilov on 10/2/2018

Synaptics' Next-Gen Fingerprint Sensor Security: The FS7600 Match-In-Sensor

Synaptics last month introduced its second-generation match-in-sensor (MIS) solution designed for a wide range of fingerprint sensors including those in PCs and other devices. The new FS7600 MIS relies...

5 by Anton Shilov on 8/6/2018

Synaptics at Computex: Encrypted and In-Display Fingerprint Sensors in Real Products

Synaptics is one of the companies that have to do its announcements in two stages: initially, it announces its own product and then it showcases its partners’ products that...

8 by Anton Shilov on 6/5/2018

Spectre Watch: More Spectre-class CPU Vulnerabilities to be Announced Soon?

This morning has seen an interesting turn of events in the world of processor security. c't magazine has published an exclusive report stating that they got wind of a...

78 by Ryan Smith on 5/3/2018

Intel Announces Chip-Level Security Initiatives, iGPU-Based Malware Scanning

Taking place this week is the annual RSA conference, which has evolved to become a major trade show for security products and technologies. As one might expect, it's also...

36 by Anton Shilov on 4/17/2018

Intel Wraps Up Spectre Patching, Partially Cancels Plans For 1st Gen Core & Core 2 Processors

Intel this week has published an update to their ongoing microcode guidance document. In the roughly 3 weeks since the last update, the company is offering some unexpectedly mixed...

27 by Ryan Smith on 4/4/2018

AMD Confirms CTS-Labs Exploits: All To Be Patched In Weeks

If you have been following our coverage regarding the recent security issues found in AMD’s processors and chipsets by security research firm CTS-Labs, it has been a bit of...

101 by Ian Cutress on 3/20/2018

Ian Cutress Talks AMDFlaws and Security on TechTeamGB Weekly News

After our analysis about the vulnerability disclosures this week on AnandTech, and continuing discussions on Twitter, TechTeamGB, a Great Britain based Youtube technology channel, invited Senior Editor Ian Cutress...

16 by Ian Cutress on 3/16/2018

Our Interesting Call with CTS-Labs

In light of the recent announcement of potential vulnerabilities in Ryzen processors, two stories have emerged. Firstly, that AMD processors could have secondary vulnerabilities in the secure processor and...

122 by Ian Cutress on 3/15/2018

Intel Publishes Spectre & Meltdown Hardware Plans: Fixed Gear Later This Year

Since the public revelation of the Meltdown and Spectre CPU vulnerabilities early this year, Intel has spent virtually the entire time in a reactionary mode, starting from the moment...

31 by Ryan Smith on 3/15/2018

Security Researchers Publish Ryzen Flaws, Gave AMD 24 hours Prior Notice

Through the advent of Meltdown and Spectre, there is a heightened element of nervousness around potential security flaws in modern high-performance processors, especially those that deal with the core...

213 by Ian Cutress on 3/13/2018

Intel Appoints New CTO, Confirms Establishment of Product Assurance & Security Group

Intel this week named Michael Mayberry its new Chief Technology Officer effective immediately. The new CTO will be responsible for Intel’s global research and technology development efforts. In addition...

19 by Anton Shilov on 2/2/2018

Understanding Meltdown & Spectre: What To Know About New Exploits That Affect Virtually All CPUs

It seems only fitting that one of the two hardware based exploits to rock the CPU world this week was named Meltdown. Because for the last 24 hours or...

210 by Ryan Smith on 1/4/2018

Synaptics Unveils Clear ID In-Display Fingerprint Sensor for 18:9, 20:9 Smartphones

Synaptics this week introduced its first Clear ID FS9500 in-display optical sensor that can be installed under the surface of an OLED screen. The fingerprint reader works faster than...

39 by Anton Shilov on 12/14/2017

Multiple WiFi Encryption Vulnerabilities Disclosed, Affecting Almost Everything

Today a collection of severe security vulnerabilities in the WPA2 encryption protocol for Wi-Fi are being disclosed, along with a proof of concept exploit. The weaknesses center around the...

39 by Billy Tallis on 10/16/2017

Synaptics Discusses Fingerprint Security and the Need For End-to-End Encryption

In a bid to demonstrate the advantages of its latest-generation SentryPoint fingerprint solutions, at this year's Computex event Synaptics came with a very interesting demonstration for breaking into a...

13 by Anton Shilov on 6/9/2017

Log in

Don't have an account? Sign up now