Language Selection

English French German Italian Portuguese Spanish

Security: Blockchains, Disabling Intel ME, Windows, and Mac OS

Filed under
Security
  • Blockchains Are Poised to End the Password Era

    The massive password heists keeping coming, and one thing is certain: the way we prove our identities online is in need of a major upgrade. A growing chorus of technologists and entrepreneurs is convinced that the key to revolutionizing digital identity can be found in the same technology that runs cryptocurrencies.

  • Three Laptop Makers Are Disabling Intel ME

    For years now, security experts warned that Intel’s Management Engine (ME) is at risk of being exploited; ME allows administrators to remotely access a computer and is present within every Intel processor since 2008. Finally – after staying quiet during the period of concern – Intel last month admitted that ME is vulnerable to exploitation. As a result, PC makers are making moves to protect users from said vulnerability. Indeed, Dell, Purism, and Linux PC vendor System76 are all disabling Intel ME on their laptops.

  • Microsoft Breaks Down Windows Update on Windows 7, PCs Hit with Error 80248015

    A number of Windows 7 and Windows Server 2008 systems are experiencing a Windows Update error that prevents them from checking for updates for an unclear reason.

    Posts on the company’s Community forums seem to indicate that the bug first appeared on December 3 and it’s a server-side issue, which means that users might not have anything to do to have this fixed. Instead, Microsoft has remained tight-lipped on the actual cause of the bug, despite the growing number of posts on the said Community thread.

    Checking for updates on the impacted systems fails with error “Windows could not search for new updates,” with some saying that an additional message reading “Windows Update cannot currently check for updates because the service is not running. You may need to restart your computer,” when they click the “Get help with this error” option in Windows Update.

  • Apple’s macOS 10.13.1 Update Brings Back Critical Root Vulnerability

And a couple more

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

GNU Compiler and Bison 3.2.2 Release

  • Intel Cascade Lake Support Posted For The GCC Compiler
    Intel developers have submitted their GCC compiler enablement patch for the Cascade Lake 14nm CPUs due out starting in early 2019. The GNU Compiler Collection patch adds support for the -march=cascadelake target for generating optimized code for these upcoming server and enthusiast class processors.
  • Bison 3.2.2 released [stable]
    Bison 3.2 brought massive improvements to the deterministic C++ skeleton, lalr1.cc. When variants are enabled and the compiler supports C++11 or better, move-only types can now be used for semantic values. C++98 support is not deprecated. Please see the NEWS below for more details. Many thanks to Frank Heckenbach for paving the way for this release with his implementation of a skeleton in C++17, and to Nelson H. F. Beebe for testing exhaustively portability issues.

Industrial dev board builds on Raspberry Pi CM3

Kontron announced an industrial-focused “Passepartout” development kit built around a Raspberry Pi Compute Module 3 Light and equipped with a dual Ethernet, HDMI, CAN, 1-Wire, RPi 40-pin connectors. Kontron announced its first Raspberry Pi based product. The Passepartout — which is French for “goes everywhere” and the name of Phileas Fogg’s valet in Jules Verne’s “Around the World in Eighty Days” — builds upon the Linux-driven Raspberry Pi Compute Module 3 Light (CM3L). The Light version lacks the 4GB of eMMC flash of the standard CM3 module but still supports eMMC or microSD storage. The CM3L is otherwise identical, with features including a quad-core, 1.2GHz Broadcom BCM2837 and 1GB of LPDDR2 RAM. Read more

Patches For The Better Spectre STIBP Approach Revised - Version 7 Under Review

Version 7 of the task property based options to enable Spectre V2 userspace-userspace protection patches, a.k.a. the work offering improved / less regressing approach for STIBP, is now available for testing and code review. Tim Chen of Intel sent out the seventh revision to these patches on Tuesday night. Besides the Spectre V2 app-to-app protection modes, these patches include the work for disabling STIBP (Single Thread Indirect Branch Predictors) when enhanced IBRS (Indirect Branch Restricted Speculation) is supported/used, and allowing for STIBP to be enabled manually and just by default for non-dumpable tasks. Read more

today's howtos