Skip to main content

Intel

Intel’s new i9-10900K—fast, yes; competitive, not so much

posted onMay 21, 2020
by l33tdawg
Credit: Arstechnica

We finally got our grubby paws on the flagship SKU of Intel's new Comet Lake desktop processors—the (sorta) 5.3GHz, (well over) 125W TDP i9-10900K. Intel's extremely lackluster performance marketing led us to believe the processor would probably be little if any improvement over last year's i9-9900K—but, happily, that's not the case.

Microsoft and Intel project converts malware into images before analyzing it

posted onMay 11, 2020
by l33tdawg
Credit: ZDNet

Microsoft and Intel have recently collaborated on a new research project that explored a new approach to detecting and classifying malware.

Called STAMINA (STAtic Malware-as-Image Network Analysis), the project relies on a new technique that converts malware samples into grayscale images and then scans the image for textural and structural patterns specific to malware samples.

Intel Is Patching the Patch for the Patch for Its ‘Zombieload’ Flaw

posted onJanuary 28, 2020
by l33tdawg
Credit: Wired

Over the last two years, security researchers have dug up one technique after another that lets a hacker trick Intel's microprocessors into spilling a computer's deepest secrets. As those flaws have been exposed, chipmakers have scrambled to patch them. But for one serious form of those attacks, it turns out that Intel still hasn't successfully patched the underlying problem despite 18 months of warnings—and not one but two failed attempts to do so.

Intel’s SGX coughs up crypto keys when scientists tweak CPU voltage

posted onDecember 10, 2019
by l33tdawg
Credit: Arstechnica

To counter the growing sophistication of computer attacks, Intel and other chip makers have built digital vaults into CPUs to segregate sensitive computations and secrets from the main engine computers use. Now, scientists have devised an attack that causes the Software Guard Extensions—Intel's implementation of this secure CPU environment to divulge cryptographic keys and induce potentially dangerous memory errors.

Intel Core i9-10980XE—a step forward for AI, a step back for everything else

posted onNovember 27, 2019
by l33tdawg
Credit: Arstechnica

Intel's new i9-10980XE, debuting on the same day as AMD's new Threadripper line, occupies a strange market segment: the "budget high-end desktop." Its 18 cores and 36 threads sound pretty exciting compared to Intel's top-end gaming CPU, the i9-9900KS—but they pale in comparison to Threadripper 3970x's 32 cores and 64 threads. Making things worse, despite having more than double the cores, i9-10980XE has trouble differentiating itself even from the much less expensive i9-9900KS in many benchmarks.

Intel Patched 77 Vulnerabilities in November 2019 Platform Update

posted onNovember 14, 2019
by l33tdawg
Credit: Bleeping Computer

Intel addressed 77 vulnerabilities during the November 2019 Patch Tuesday, with more than two dozen of them being high severity and critical security flaws impacting Windows and Linux.

The issues were detailed in the 18 security advisories published by Intel on its Product Security Center, with the company having delivered them to users through the Intel Platform Update (IPU) process.

Apple confirms its purchase of Intel’s modem business to the tune of $1 billion

posted onJuly 25, 2019
by l33tdawg
Credit: Arstechnica

Apple today announced that it will acquire the majority of Intel's smartphone modem business for $1 billion. The acquisition will bring 2,200 Intel employees under Apple's umbrella, along with various intellectual properties, leases, and equipment. After the move is complete, Apple will hold more than 17,000 wireless technology patents, and Intel will still be able to develop modems for PCs, vehicles, IoT devices, and other products that aren't smartphones.

New Intel firmware boot verification bypass enables low-level backdoors

posted onMay 15, 2019
by l33tdawg
Credit: CSO Online

Researchers have found a new way to defeat the boot verification process for some Intel-based systems, but the technique can also impact other platforms and can be used to compromise machines in a stealthy and persistent way.

Researchers Peter Bosch and Trammell Hudson presented a time-of-check, time-of-use (TOCTOU) attack against the Boot Guard feature of Intel's reference Unified Extensible Firmware Interface (UEFI) implementation at the Hack in the Box conference in Amsterdam this week.