![intel](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/09115818/intel-1400-400x200.jpg)
Downfall attacks can gather passwords, encryption keys from Intel processors
A variety of Intel Core processors and the devices using them are vulnerable to “Downfall”, a new class of attacks made possible by CVE-2022-40982, which enables …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093801/cloud-drive2-400x200.jpg)
How to eliminate the weak link in public cloud-based multi-party computation
Secure multi-party computation (MPC) has seen steady evolution to tackle many scientific challenges. These include enabling the creation and tuning of AI or machine learning …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093341/crypto-coin-400x200.jpg)
Malicious actors targeting the cloud for cryptocurrency-mining activities
Trend Micro announced a report revealing a fierce, hour-by-hour battle for resources among malicious cryptocurrency mining groups. “Just a few hours of compromise could …
![virtual reality](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112824/virtual_reality-400x200.jpg)
5 reasons IT should consider client virtualization
Virtualization has brought a dramatic level of growth and advancement to technology and business over the years. It transforms physical infrastructure into dedicated, …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111830/ransomware-400x200.jpg)
Pandemic thinking: What if there were a vaccine for OT ransomware?
The year 2020 has been defined globally by the COVID-19 pandemic. One of few silver linings for this difficult set of circumstances is innovation – redesigning normal …
![VoltPillager](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/15075747/voltpillager-400x200.jpg)
Researchers break Intel SGX by creating $30 device to control CPU voltage
Researchers at the University of Birmingham have managed to break Intel SGX, a set of security functions used by Intel processors, by creating a $30 device to control CPU …
![SSD](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095813/SSD2-400x200.jpg)
PinK: A new way of implementing a key-value store in SSDs
As web services, cloud storage, and big-data services continue expanding and finding their way into our lives, the gigantic hardware infrastructures they rely on–known …
![Intel processor](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102506/intel-processor-400x200.jpg)
Intel releases updates to plug TPM-FAIL flaws, foil ZombieLoad v2 attacks
Intel’s Patch Tuesday releases are rarely so salient as those pushed out this month: the semiconductor chip manufacturer has patched a slew of high-profile …
![Intel CPU](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195036/intel-cpu-400x200.jpg)
SWAPGS Attack: A new Spectre haunts machines with Intel CPUs
Bitdefender researchers have uncovered yet another viable speculative execution side-channel attack that can be leveraged against Intel CPUs and the computers running on them. …
![Intel inside](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102254/intel-inside-fire-400x200.jpg)
Intel MDS attack mitigation: An overview
Intel has revealed on Tuesday that some of its CPUs are vulnerable to a number of new speculative execution attacks that may allow attackers to stealing sensitive data and …
![Qualcomm](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094501/qualcomm-400x200.jpg)
Qualcomm chips leak crypto data from secure execution environment
A vulnerability in Qualcomm chips could be exploited by attackers to retrieve encryption keys and sensitive information from the chipsets’ secure execution environment, …
![Intel inside](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102256/intel_inside-400x200.jpg)
New Spectre-like flaw found in CPUs using speculative execution
A new flaw that can allow an attacker to obtain access to sensitive information on affected systems has been discovered in modern CPUs. CVE-2018-3639, discovered by …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD