HackDig : Dig high-quality web security articles for hackers

Intel announces “exploit busting” features in its next processor chips

byPaul DucklinIntel is adding two new exploit detection systems into its forthcoming processors.The new technology has been at least four years in the making, according the chip giant’s recently updated specification document, which contains a “version 1.0” release date of June 2016.Intel’s PR machine has been making waves about the s
Publish At:2020-06-16 14:48 | Read:213 | Comments:0 | Tags:Uncategorized ASLR CET DEP Exploit gadget intel ROP vulnerab

CVE-2019-0090 flaw affects Intel Chips released in the last 5 years

A new vulnerability, tracked as CVE-2019-0090, affects all Intel chips that could allow attackers to bypass every hardware-enabled security technology. Security experts from Positive Technologies warn of a new vulnerability, tracked as CVE-2019-0090, that affects all Intel processors that were released in the past 5 years. The flaw is currently defined
Publish At:2020-03-07 10:00 | Read:427 | Comments:0 | Tags:Breaking News Hacking CVE-2019-0090 information security new

More dangerous vulnerabilities in Intel CPUs

Intel  has released information about two potentially dangerous flaws in the processor architecture of its CPUs. The chip manufacturer had already provided security updates for similar gaps in May and November 2019. Although the new vulnerabilities seem to be less critical than the previous ones, side-channel attacks are still possible. The third Intel patch
Publish At:2020-02-04 09:15 | Read:663 | Comments:0 | Tags:Business News CPU Germany intel

Hacking with AWS: incorporating leaky buckets into your OSINT workflow

Penetration testing is often conducted by security researchers to help organizations identify holes in their security and fix them, before cybercriminals have the chance. While there’s no malicious intent for the researcher, part of his job is to think and act like a cybercriminal would when hacking, or attempting to breach, an enterprise network. T
Publish At:2019-09-20 11:20 | Read:1589 | Comments:0 | Tags:Researcher's corner amazon aws AWS buckets data hacking Inte

Experts found an undocumented Kill Switch in Intel Management Engine

Security researchers at Positive Technologies have discovered an undocumented configuration setting that disables the Intel Management Engine. Security researchers at Positive Technologies have discovered an undocumented configuration setting that disables the CPU control mechanism Intel Management Engine 11. The Intel Management Engine consists of a microco
Publish At:2017-08-29 11:20 | Read:3345 | Comments:0 | Tags:Breaking News Hacking CVE-2017-5689 Intel Intel Management E

A critical RCE flaw in Intel Management Engine affects Intel enterprise PCs dates back 9 years

A critical remote code execution vulnerability tracked as CVE-2017-5689 in Intel Management Engine affects Intel enterprise PCs dates back 9 years. A critical remote code execution (RCE) vulnerability tracked as CVE-2017-5689 has been discovered in the remote management features implemented on computers shipped with Intel Chipset in past 9 years. The vulnera
Publish At:2017-05-02 20:05 | Read:4417 | Comments:0 | Tags:Breaking News Hacking CVE-2017-5689 Intel Intel Management E

Intel Launches Its First-Ever Bug Bounty Program

Intel has announced it will begin rewarding researchers who responsibly disclose security vulnerabilities they find in its products.On 15 March, the Santa Clara-based multinational corporation and technology company unveiled its first-ever bug bounty. It made the announcement in Vancouver, British Columbia at the CanSecWest security conference, one of The St
Publish At:2017-03-17 12:35 | Read:4306 | Comments:0 | Tags:Latest Security News Bug Bounty Intel vulnerability

CHIPSEC, Intel Security releases detection tool also for CIA EFI rootkits

After CIA leak, Intel Security releases CHIPSEC, a detection tool for EFI rootkits that detect rogue binaries inside the computer firmware. A few days ago, WikiLeaks announced it is working with software makers to fix the zero-day flaws in Vault7 dump that impacted their products and services. The organization is sharing information on the hacking tools inc
Publish At:2017-03-13 18:05 | Read:5703 | Comments:0 | Tags:Breaking News Hacking CHIPSEC CIA Intel QuarkMatter UEFI Vau

Harmful prefetch on Intel

By Enrique NissimWe've seen a lot of articles and presentations that show howthe prefetch instruction can be used to bypass modern OS kernel implementationsof ASLR. Most of the public work however only focuses on getting base addressesof modules with the idea of building a ROP chain or maybe patching somepointer/value of the data section. This post rep
Publish At:2017-01-25 07:35 | Read:5582 | Comments:0 | Tags:computer security computer threat Enrique Nissim hacker hack

Flaw in Intel CPUs could allow to bypass ASLR defense

A flaw in Intel chips could be exploited to launch “Side channel” attack allowing attackers bypass protection mechanism known as ASLR. A vulnerability in the Intel’s Haswell CPUs can be exploited to bypass the anti-exploitation technology address space layout randomization (ASLR) that in implemented by all the principal operating systems. The ASLR is a
Publish At:2016-10-20 07:55 | Read:5338 | Comments:0 | Tags:Breaking News Hacking ASLR chip buffer overflow Intel

What’s Your Click IQ?

The recent celebrity photo hacks are an unfortunate reminder of how devastating or embarrassing it can be to have your data compromised.  But celebrities are not the only ones getting hacked. Cybercriminals aren’t choosy—they’ll send malicious texts, emails, and website links to Jennifer Lawrence and your grandma. And while the celebrity hacks are more publi
Publish At:2014-10-06 18:20 | Read:4245 | Comments:0 | Tags:Consumer Family Safety Identity Protection Mobile Security c

IDF 2014 – Where There’s a Developer, There’s a Way!

A busy week at the Intel Developer Forum has just come to a close. Over the course of three (somewhat) sunny days in San Francisco, we got a chance to see what the developers, makers and creators of today’s technologies have in store for the upcoming year. Just in case you didn’t get a chance to make it to IDF this year, we’ve pulled together some highlights
Publish At:2014-09-15 19:10 | Read:3473 | Comments:0 | Tags:Security Connected Events intel Intel Security security conn

That’s a Wrap! – VMworld 2014

This past week, technology professionals and executives came together at the Moscone Center in San Francisco for VMworld 2014. Over the course of the five-day event we sat in on some great sessions, led a few demos, hosted onsite games and challenges, and made two exciting new product announcements. It was a busy week with a lot happening, so we’ve put toget
Publish At:2014-09-06 07:30 | Read:3808 | Comments:0 | Tags:Security Connected Events intel Intel Security security conn

Glass Reflections in Pictures + OSINT = More Accurate Location

By Alejandro Hernández - @nitr0usmxDisclaimer: The aim of this article is to help people to be more careful when taking pictures through windows because they might reveal their location inadvertently. The technique presented here might be used for many different purposes, such as to track down the location of the bad guys, to simply know in which hotel is t
Publish At:2014-08-12 01:40 | Read:5879 | Comments:0 | Tags:Alejandro Hernandez cybersecurity geolocation glass intel io


Share high-quality web security related articles with you:)