3692 views|9 replies

9161

Posts

6

Resources
The OP
 

Intel announces firmware vulnerability that could allow millions of computers to be remotely hijacked [Copy link]

Intel this week acknowledged that multiple serious security vulnerabilities have been found in Intel processors sold in the past two years, including the latest 8th-generation Core processor series. The security vulnerabilities are mainly concentrated in the "Management Engine" function of Intel chips. These Intel chips, which have been supplied to equipment manufacturers such as Dell, Lenovo, and HP, can be remotely exploited to launch cyber attacks. Security experts said that it is not clear how difficult it is to exploit these vulnerabilities, but it is clear that such remote vulnerabilities at the chip level are disturbing, and the chips involved are already widely used, including the 6th-generation Core chips launched in 2015 and the 7th-generation chips launched last year.
It is predicted that these vulnerabilities can basically affect every commercial computer or server equipped with Intel processor released in the past two years>>>More
It seems that the already slow system will have another wave of security updates.
Do you often check for system updates and install them? Has your computer been "hijacked"? If your computer is "hijacked", what do you think should be done first?

timg.jpg (38.87 KB, downloads: 0)

timg.jpg
This post is from Talking
Add and join groups EEWorld service account EEWorld subscription account Automotive development circle

Latest reply

Basically, the more complex the functionality, the greater the chance that the code will "break", and the greater the risk that the remediation will cause other defects.  Details Published on 2017-12-10 01:38
 
 

1403

Posts

1

Resources
2
 
The first thing to do is to unplug the power cord? Why hijack it? Intel is also making trouble, so they should be able to make a patch to plug this vulnerability.
This post is from Talking
Personal signatureHELLO_WATER
 
 
 

478

Posts

0

Resources
3
 
I am a person who must upgrade whenever there is an update, no matter if it is to plug security holes or not. I once saw a printing company's computer was infected with the Panda Burning Incense virus, and all Word and Excel icons turned into Panda Burning Incense icons. I was so scared that I went back to low-level format the computer hard drive and repartitioned it to do the system. Now I often encounter DNS hijacking, and I modify it manually as soon as possible. That's it.
This post is from Talking
 
 
 

1297

Posts

2

Resources
4
 
There is only a forwarding, no original text, no truth. Besides, the chip vulnerability needs code to be exploited, and to remotely execute code, you have to hack into the system first, so Microsoft has to take the blame again?
This post is from Talking

Comments

MAC said: None of my business  Details Published on 2017-11-23 16:55
 
 
 

1461

Posts

1

Resources
5
 
amd fx6300, safe for now.
This post is from Talking
 
 
 

1272

Posts

2

Resources
6
 
I was so scared that I broke the CPU
This post is from Talking
 
 
 

1234

Posts

4

Resources
7
 
johnrey posted on 2017-11-23 13:02 There is only a forwarding, no original text, no truth. Besides, the chip vulnerability needs code to exploit, and to remotely execute code, you have to hack first...
MAC said: It's none of my business
This post is from Talking
Personal signature天地庄周马;江湖范蠡船。
个性签名还是放QQ号吧,2060347305,添加说明EEworld好友
 
 
 

31

Posts

0

Resources
8
 
This post is from Talking
 
 
 

256

Posts

0

Resources
9
 
Haven't used such a new CPU yet
This post is from Talking
 
 
 

1331

Posts

0

Resources
10
 
Basically, the more complex the functionality, the greater the chance that the code will "break", and the greater the risk that the remediation will cause other defects.
This post is from Talking
Personal signature理论还需理论解!
 
 
 

Just looking around
Find a datasheet?

EEWorld Datasheet Technical Support

EEWorld
subscription
account

EEWorld
service
account

Automotive
development
circle

About Us Customer Service Contact Information Datasheet Sitemap LatestNews

Room 1530, Zhongguancun MOOC Times Building, Block B, 18 Zhongguancun Street, Haidian District, Beijing 100190, China Tel:(010)82350740 Postcode:100190

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京B2-20211791 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号
快速回复 返回顶部 Return list