. | . |
Researchers find 'critical' security flaws in AMD chips by Staff Writers Washington (AFP) March 13, 2018 Security researchers said Tuesday they discovered flaws in chips made by Advanced Micro Devices that could allow hackers to take over computers and networks. Israeli-based security firm CTS Labs published its research showing "multiple critical security vulnerabilities and exploitable manufacturer backdoors" in AMD chips. CTS itemized 13 flaws, saying they "have the potential to put organizations at significantly increased risk of cyberattacks." The report comes weeks after Intel disclosed similar hardware-based flaws dubbed Meltdown and Spectre, sparking widespread computer security concerns and a congressional inquiry. CTS said the newly discovered flaws could compromise AMD's new chips that handle applications in the enterprise, industrial and aerospace sectors, as well as consumer products. In a 20-page white paper, the researchers said the AMD Secure Processor, the gatekeeper responsible for the security of AMD processors, contains "critical vulnerabilities" that "could allow malicious actors to permanently install malicious code inside the Secure Processor itself." "These vulnerabilities could expose AMD customers to industrial espionage that is virtually undetectable by most security solutions," the researchers said. CTS said AMD's Ryzen chipset, which AMD outsourced to a Taiwanese chip manufacturer, ASMedia, "is currently being shipped with exploitable manufacturer backdoors inside." This could allow attackers "to inject malicious code into the chip" and create "an ideal target" for hackers, the researchers said. "CTS believes that networks that contain AMD computers are at a considerable risk," the report said. "The vulnerabilities we have discovered allow bad actors who infiltrated the network to persist in it, surviving computer reboots and reinstallations of the operating system. "This allows attackers to engage in persistent, virtually undetectable espionage, buried deep in the system." AMD, one of the largest semiconductor firms specializing in processors for PCs and servers, said it was studying the latest report. "At AMD, security is a top priority and we are continually working to ensure the safety of our users as new risks arise," the California-based company said in a statement. "We are investigating this report, which we just received, to understand the methodology and merit of the findings." Analysts at the security firm enSilo said the AMD flaws could be worse than those affecting Intel chips. "The impact of these vulnerabilities is more severe than Meltdown/Spectre as it allows an attacker to execute highly privileged code and persist on the victim machine," enSilo said in a blog post. Additionally, some of the flaws may be nearly impossible to patch. "We estimate that without patches from AMD, protection against the vulnerabilities can be limited at best," enSilo researchers said. "The best protection is to block malware that attempts to leverage these vulnerabilities."
Concern over China influence shadows chip sector deal San Francisco (AFP) March 9, 2018 Concern over China's potential influence, and rising US protectionist sentiment, hangs over an effort by California-based Qualcomm to repel a Singaporean firm's hostile takeover bid. If finalized, a tie-up between Broadcom and Qualcomm would be worth an estimated $117 billion and potentially the biggest-ever deal in the tech sector. But Qualcomm rejected multiple Broadcom offers during weeks of parries and thrusts between the two firms since the proposed deal emerged in November. In the late ... read more
|
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us. |