El Reg published an article about a security flaw introduced by Intel starting with its Pentium Pro line of processors--and left in place for fifteen years, fixing it only in 2011--and also comes with instructions on how to exploit it. So, if you have any pre-2011 processor running some important machine, perhaps you should be thinking of an upgrade after you finish reading the article.
From the article:
It allows smart hackers to run rootkit code at the very lowest level on the computer, out of reach of the operating system, its applications, and even the hypervisor. This means the rootkit can, among other things, silently monitor and record the user's every keypress, mouse click, and download.
Efforts to detect the rootkit and eradicate it from a computer can be blocked, or hampered, by the malware itself. A nightmare, in other words.
The good news is that Intel spotted the howler in its processor blueprints, and corrected the issue: chips built from January 2011 and onwards (Sandy Bridge Core CPUs and later) are not affected. Also, operating systems can mitigate against the security hole at the hypervisor level, thus protecting themselves from miscreants exploiting the design flaw...
This kind of thing makes me want to go back to using a pocket calculator.
(Score: 3, Funny) by gman003 on Wednesday August 12 2015, @03:28AM
I doubt AMD is any better regarding security. Possibly worse, since they have much fewer engineers and would probably devote more resources towards trying to catch up on performance, not something as unmarketable as security.
(Score: 1, Touché) by Anonymous Coward on Wednesday August 12 2015, @05:33AM
Implying it didn't cost more to add the backdoor, and that it was finally removed because they don't need this one anymore since they root the newer chips wirelessly now via an on-chip cellular "anti-theft" feature.
"Oh, and we'll even name the company 'INTEL', haha... and the suckers will still buy it!"
At least now we know why China has been working on their own chip fabs, mostly with MIPS instead of ARM or x86[-64].