Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Hardware
Hardware Discussions
How do you know if you want an Intel or AMD processor?
Message
<blockquote data-quote="HarborFront" data-source="post: 893781" data-attributes="member: 55987"><p>TB flaw doesn't affect latest intel cpu like the Icelake. I believe anything that comes after it will not be affected. Also,</p><p></p><p>Quote</p><p></p><p><strong>Update</strong>: Intel responded to Thunderspy stating that newer versions of Windows 10, Mac OS X and Linux supported a feature called Kernel Direct Memory Access (DMA) protection which mitigated against attacks outlined in the research paper. Microsoft <a href="https://docs.microsoft.com/en-us/windows/security/information-protection/kernel-dma-protection-for-thunderbolt" target="_blank">published</a> an article about this here on its Docs website. On systems running at least Windows 10 version 1803, administrators may go to Start > Settings > Update & Security > Windows Security > Open Windows Security > Device security > Core isolation details > Memory access protection to verify that memory access protection is enabled; this requires a UEFI firmware support and is not compatible with other BitLocker DMA attacks countermeasures.</p><p></p><p>Unquote</p><p></p><p>[URL unfurl="true"]https://www.ghacks.net/2020/05/11/thunderspy-find-out-whether-your-device-is-vulnerable-to-local-thunderbolt-security-issues/[/URL]</p><p></p><p>Quote</p><p></p><p>In 2019, major operating systems implemented Kernel Direct Memory Access (DMA) protection to mitigate against attacks such as these. This includes Windows (Windows 10 1803 RS4 and later), Linux (kernel 5.x and later), and MacOS (MacOS 10.12.4 and later). The researchers did not demonstrate successful DMA attacks against systems with these mitigations enabled. Please check with your <a href="https://www.intel.com/content/www/us/en/support/topics/oems.html" target="_blank">system manufacturer</a> to determine if your system has these mitigations incorporated. For all systems, we recommend following standard security practices, including the use of only trusted peripherals and preventing unauthorized physical access to computers. </p><p></p><p>Unquote</p><p></p><p>[URL unfurl="true"]https://blogs.intel.com/technology/2020/05/more-information-on-thunderspy/[/URL]</p></blockquote><p></p>
[QUOTE="HarborFront, post: 893781, member: 55987"] TB flaw doesn't affect latest intel cpu like the Icelake. I believe anything that comes after it will not be affected. Also, Quote [B]Update[/B]: Intel responded to Thunderspy stating that newer versions of Windows 10, Mac OS X and Linux supported a feature called Kernel Direct Memory Access (DMA) protection which mitigated against attacks outlined in the research paper. Microsoft [URL='https://docs.microsoft.com/en-us/windows/security/information-protection/kernel-dma-protection-for-thunderbolt']published[/URL] an article about this here on its Docs website. On systems running at least Windows 10 version 1803, administrators may go to Start > Settings > Update & Security > Windows Security > Open Windows Security > Device security > Core isolation details > Memory access protection to verify that memory access protection is enabled; this requires a UEFI firmware support and is not compatible with other BitLocker DMA attacks countermeasures. Unquote [URL unfurl="true"]https://www.ghacks.net/2020/05/11/thunderspy-find-out-whether-your-device-is-vulnerable-to-local-thunderbolt-security-issues/[/URL] Quote In 2019, major operating systems implemented Kernel Direct Memory Access (DMA) protection to mitigate against attacks such as these. This includes Windows (Windows 10 1803 RS4 and later), Linux (kernel 5.x and later), and MacOS (MacOS 10.12.4 and later). The researchers did not demonstrate successful DMA attacks against systems with these mitigations enabled. Please check with your [URL='https://www.intel.com/content/www/us/en/support/topics/oems.html']system manufacturer[/URL] to determine if your system has these mitigations incorporated. For all systems, we recommend following standard security practices, including the use of only trusted peripherals and preventing unauthorized physical access to computers. Unquote [URL unfurl="true"]https://blogs.intel.com/technology/2020/05/more-information-on-thunderspy/[/URL] [/QUOTE]
Insert quotes…
Verification
Post reply
Top