✨ We've just launched our NEW website design!

Learn More Here

Vulnerability

  • News

    New Vulnerabilities Found in TPM 2.0 Library

    A pair of new vulnerabilities have been found within the TPM 2.0 Library by a cybersecurity company by the name of Quarkslab. These vulnerabilities have the potential to be a threat to billions of devices What Are the Vulnerabilities? These vulnerabilities involve the Trusted Platform Module, TPM for short, which…

    Read More »
  • News
    Intel Rolls Out Core i9 Mobile Processors

    Another Intel Vulnerability, and it’s Unfixable…

    Honestly, I saw this story this morning and I couldn’t help but think “what? Again… meh, same s*** different day” but that doesn’t make it any less of a serious issue. Researchers at Positive Technologies found the vulnerability Inside Intel’s Converged Security and Management Engine (CSME). I mean, that’s what…

    Read More »
  • News

    A New Intel CPU Vulnerability “Plundervolt” has Been Discovered

    As you are probably aware, there has been more than a little news in recent years about security issues being discovered within Intel designed processors. Vulnerabilities such as these have prompted the company to launch ‘bug bounties’ to encourage ‘white hat hacking’ groups to help identify any new potential problems…

    Read More »
  • News

    Researchers find Another Major Security Flaw in Intel Processors

    You may recall that in 2018 two major security flaws were identified within Intel processors. Namely, Meltdown and Spectre. It was an issue that took them a significantly long period of time to resolve. Towards the end of the year, however, it looked like things were (relatively) back on track.…

    Read More »
  • News
    Wireless Logitech Peripherals Vulnerable to Cyber Attacks

    Wireless Logitech Peripherals Vulnerable to Cyber Attacks

    Multitude of Security Issues Affecting Mice and Keyboards Bad news for those using a Logitech wireless mouse and keyboard. According to security expert Marcus Mengs (via Heise.de), these devices are highly vulnerable to “extensive” cyber attacks. Summary of new/old Logitech vulnerabilitieshttps://t.co/CQ5ZFQolPXDisclosure timeline:https://t.co/DPWeADQtYf— Marcus Mengs (@mame82) July 8, 2019 Furthermore, Mengs…

    Read More »
  • News
    AMD Confirms Ryzen CPUs are Immune to Spoiler Vulnerability

    AMD Confirms that Ryzen CPUs are Immune to SPOILER Exploit

    Only Intel CPUs Affected In addition to the ‘Spectre’ and ‘Meltdown’ vulnerabilities, it was revealed two weeks ago that Intel CPUs have something else to be worried about. This time, there is a new threat experts are calling the ‘SPOILER’ exploit. The discovery is by researchers at the Worcester Polytechnic…

    Read More »
  • News
    Google Warns Users of Two Zero-Day Vulnerabilities in Chrome

    Google Warns Users of Two Zero-Day Vulnerabilities in Chrome

    Update Strongly Encouraged Google‘s Threat Analysis team has discovered two Zero-day vulnerabilities last week affecting the Chrome browser. They have now issued an update fix with the latest version 72.0.3626.121. Normally, some users have auto-update enabled. However, in case you are unsure, simply go to Settings > About Chrome then…

    Read More »
  • News
    Intel Quietly Adds the B365 Chipset to their 300-Series Lineup

    New ‘Spoiler’ Intel Security Vulnerability Is Found

    Intel ‘Spoiler’ Vulnerability Throughout most of 2018, Intel was having to deal with a rather disturbing security flaw with their processor design. In it’s simplest terms, two differing flaws were found called ‘Spectre’ and ‘Meltdown’. While the jury was out as to how much of a risk these posed to…

    Read More »
  • News

    Report: Every Post-2008 Intel Processor is Remotely Exploitable

    A year ago, we reported that a management technology present in all x86 CPUs left them open to remote rootkit attacks. Now, it seems that the same issue – despite Intel being aware of it – is also present in the company’s 7th-generation Kaby Lake processors, according to SemiAccurate. The…

    Read More »
  • News

    Lynksys Routers Feature Massive Security Flaw

    Security researchers have found that a number of Linksys Smart Wi-Fi routers contain vulnerabilities that could be exploited to form part of a botnet. Cybersecurity consultancy IOActive discovered that these flaws – ten separate issues across twenty models – could allow hackers to take over the device and change its credentials,…

    Read More »
  • News

    Windows 10 Has More Vulnerabilities Than Any Other OS

    A security analysis of Windows 10 has shown that the software has more vulnerabilities than any other operating system, and that it has nearly 50% more than Windows 8 and 8.1. The report, commissioned by security company Avecto, found particular fault with Microsoft’s two internet browsers – Internet Explorer and…

    Read More »
  • News

    Microsoft Delays Patching Windows Zero-Day Vulnerability

    Microsoft’s new update policy for Windows Updates means that all fixes and revisions to the operating system a now delivered in one monthly rollup, rather than incrementally as they are created, on the second Tuesday of each month, which has become known as Patch Tuesday. February’s second Tuesday – 14th…

    Read More »
  • News

    Intel Skylake Flaw Allows Full System Control Over USB

    Intel has had quite a bit of success with their Skylake processors, and with good reason. They perform great. However, security researchers have found a new bug in some of these processors that can allow anyone to get full system control via the USB 3.0 ports. That’s a big and…

    Read More »
  • News

    CERT Warns Customers of Vulnerability Found in Netgear Routers

    Netgear is just the latest of many high-profile companies to come under fire from security watchdogs and due to severe security holes that go unpatched. When such a security flaw is situated in your router, then it’s even worse since the router is the door into your home. The exploit…

    Read More »
  • News

    Rootkit Discovered in Over 2.8 Million Low-Cost Android Phones

    Close to 3 million Android phones have been discovered to contain a very powerful rootkit/backdoor that leaves the user vulnerable to remote control, tracking and code execution attacks. These phones are affordable low-cost models and can be purchased in the US in any Best Buy store. Researchers from BitSight Technologies…

    Read More »
Back to top button
Close

Adblock Detected

Please consider supporting us by disabling your ad blocker!   eTeknix prides itself on supplying the most accurate and informative PC and tech related news and reviews and this is made possible by advertisements but be rest assured that we will never serve pop ups, self playing audio ads or any form of ad that tracks your information as your data security is as important to us as it is to you.   If you want to help support us further you can over on our Patreon!   Thank you for visiting eTeknix