<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>COMBATSIM.COM &#187; Security</title>
	<atom:link href="http://www.combatsim.com/topics/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.combatsim.com</link>
	<description>The Ultimate Combat Simulation and Strategy Gamers&#039; Resource.</description>
	<lastBuildDate>Wed, 06 May 2026 18:50:26 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.1</generator>
	<item>
		<title>Researchers Reveal Variant 4 of Spectre Vulnerability</title>
		<link>https://www.combatsim.com/2018/05/researchers-reveal-variant-4-of-spectre-vulnerability.htm/</link>
		<comments>https://www.combatsim.com/2018/05/researchers-reveal-variant-4-of-spectre-vulnerability.htm/#comments</comments>
		<pubDate>Wed, 23 May 2018 20:02:48 +0000</pubDate>
		<dc:creator><![CDATA[Donster]]></dc:creator>
				<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.combatsim.com/?p=6836</guid>
		<description><![CDATA[By Hilbert Hagedoorn @ Guru3D As discussed a few weeks ago, a new Spectre vulnerability has been shared and made public today. Earlier on it was reported that there are eight new vulnerabilities, grouped and named as Spectre-ng, of which four are critical. Today the Store Bypass (SSB) vulnerability has been published and effects Intel, [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><em> <a href="http://www.combatsim.com/wp-content/uploads/2018/05/spectre-vulnerability.jpg"><img class="alignright size-medium wp-image-6837" src="http://www.combatsim.com/wp-content/uploads/2018/05/spectre-vulnerability.jpg" alt="spectre-vulnerability" width="200" height="157" /></a>By Hilbert Hagedoorn @ Guru3D</em></p>
<p>As discussed a few weeks ago, a new <em>Spectre</em> vulnerability has been shared and made public today. Earlier on it was reported that there are eight new vulnerabilities, grouped and named as Spectre-ng, of which four are critical. Today the Store Bypass (SSB) vulnerability has been published and effects Intel, AMD and ARM.</p>
<p>Researchers from Microsoft and Googles Project Zero now published information about one of the vulnerabilities, the so-called fourth variant Spectre vulnerability, which can cause security issues. A new subclass of speculative execution side channel vulnerabilities known as Speculative Store Bypass (SSB) has been announced and assigned CVE-2018-3639. Variant 4 uses speculative execution, a feature common to most modern processor architectures, to potentially expose certain kinds of data through a side channel. An attacker who has successfully exploited this vulnerability may be able to read privileged data across trust boundaries. Vulnerable code patterns in the operating system (OS) or in applications could allow an attacker to exploit this vulnerability.</p>
<p>In the case of Just-in-Time (JIT) compilers, such as JavaScript JIT employed by modern web browsers, it may be possible for an attacker to supply JavaScript that produces native code that could give rise to an instance of speculative Store Bypass (SSB). However, Microsoft Edge, Chrome and other major browsers have taken steps to increase the difficulty of successfully creating a side channel. So with your latest Chrome, you should be fine and thus safe.</p>
<p>There are now four (published) variants of the Spectre vulnerability that can be used to read memory in processors that is not intended for that application, and thus can be abused.</p>
<p><a href="http://www.guru3d.com/news-story/researchers-reveal-variant-4-of-spectre-vulnerability.html">Read more&#8230;</a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.combatsim.com/2018/05/researchers-reveal-variant-4-of-spectre-vulnerability.htm/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Report Claims Eight New Spectre-Class Vulnerabilities Impact Intel And ARM Processors</title>
		<link>https://www.combatsim.com/2018/05/report-claims-eight-new-spectre-class-vulnerabilities-impact-intel-and-arm-processors.htm/</link>
		<comments>https://www.combatsim.com/2018/05/report-claims-eight-new-spectre-class-vulnerabilities-impact-intel-and-arm-processors.htm/#comments</comments>
		<pubDate>Fri, 04 May 2018 16:54:11 +0000</pubDate>
		<dc:creator><![CDATA[Donster]]></dc:creator>
				<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.combatsim.com/?p=6732</guid>
		<description><![CDATA[By Paul Alcorn @ Tom&#8217;s Hardware The online German computer magazine Heise.de is reporting that eight new Spectre-class vulnerabilities have been discovered. The vulnerabilities purportedly affect Intel and ARM processors, but the impact on AMD processors remain unknown. We reached out to Intel for comment, and the company provided this statement, which neither confirms nor [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><em><img class="alignright size-full wp-image-6205" src="http://www.combatsim.com/wp-content/uploads/2018/01/meltdown-and-spectre-exploits.jpg" alt="meltdown-and-spectre-exploits" width="200" height="104" />By Paul Alcorn @ Tom&#8217;s Hardware</em></p>
<p>The online German computer magazine Heise.de is reporting that eight new Spectre-class vulnerabilities have been discovered. The vulnerabilities purportedly affect Intel and ARM processors, but the impact on AMD processors remain unknown. We reached out to <em>Intel</em> for comment, and the company <a href="https://newsroom.intel.com/articles/addressing-questions-regarding-additional-security-issues/">provided this statement</a>, which neither confirms nor denies the vulnerabilities:</p>
<p><em>Protecting our customers’ data and ensuring the security of our products are critical priorities for us. We routinely work closely with customers, partners, other chipmakers and researchers to understand and mitigate any issues that are identified, and part of this process involves reserving blocks of CVE numbers. We believe strongly in the value of coordinated disclosure and will share additional details on any potential issues as we finalize mitigations. As a best practice, we continue to encourage everyone to keep their systems up-to-date.</em></p>
<p>Much like the first round of Spectre vulnerabilities, these newly discovered vulnerabilities rely upon a side-channel attack on a processors&#8217; speculative execution engine. As per normal and responsible reporting policies, the teams of researchers that discovered the attacks are not releasing details until processor vendors are given a reasonable amount of time to develop patches, which should help ward off exploits, at least for now.</p>
<p><a href="https://www.tomshardware.com/news/spectre-ng-vulnerabilities-intel-arm-amd,37002.html">Read more&#8230;</a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.combatsim.com/2018/05/report-claims-eight-new-spectre-class-vulnerabilities-impact-intel-and-arm-processors.htm/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>AMD has Readied Patches Against MasterKey, Fallout, and Chimera Vulnerabilities</title>
		<link>https://www.combatsim.com/2018/05/amd-has-readied-patches-against-masterkey-fallout-and-chimera-vulnerabilities.htm/</link>
		<comments>https://www.combatsim.com/2018/05/amd-has-readied-patches-against-masterkey-fallout-and-chimera-vulnerabilities.htm/#comments</comments>
		<pubDate>Fri, 04 May 2018 16:49:10 +0000</pubDate>
		<dc:creator><![CDATA[Donster]]></dc:creator>
				<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.combatsim.com/?p=6730</guid>
		<description><![CDATA[Source: Guru3D AMD has finished up its patches for vulnerabilities that security company CTS Labs announced last month. The chip designer reports that the updates for, among others, Epyc chips are in the final phase of testing and should become available next month through a Firmware patch. CTS Labs announced the bugs unexpectedly and without [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><em><img class="alignright size-full wp-image-6479" src="http://www.combatsim.com/wp-content/uploads/2018/03/amd-ryzenfall-masterkey-fallout-chimera.jpg" alt="amd-ryzenfall-masterkey-fallout-chimera" width="200" height="104" />Source: Guru3D</em></p>
<p><em>AMD</em> has finished up its patches for vulnerabilities that security company CTS Labs announced last month. The chip designer reports that the updates for, among others, Epyc chips are in the final phase of testing and should become available next month through a Firmware patch.</p>
<p>CTS Labs announced the bugs unexpectedly and without any warning a while ago, according to the security company, it would take many months to close the vulnerabilities. CTS recently once more contacted Toms Hardware to &#8216;express their concern about the lack of updates from AMD regarding these vulnerabilities&#8217;. The company said it believed many of the vulnerabilities &#8216;would take months to fix&#8217;. One of them, Chimera, would even require a hardware change.</p>
<p><a href="http://www.guru3d.com/news-story/amd-has-readied-patches-against-masterkeyfalloutand-chimera-vulnerabilities.html">Read on&#8230;</a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.combatsim.com/2018/05/amd-has-readied-patches-against-masterkey-fallout-and-chimera-vulnerabilities.htm/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Intel and Microsoft Release Final Spectre Patches Up to and Including Sandy Bridge</title>
		<link>https://www.combatsim.com/2018/03/intel-and-microsoft-release-final-spectre-patches-up-to-and-including-sandy-bridge.htm/</link>
		<comments>https://www.combatsim.com/2018/03/intel-and-microsoft-release-final-spectre-patches-up-to-and-including-sandy-bridge.htm/#comments</comments>
		<pubDate>Thu, 15 Mar 2018 17:37:12 +0000</pubDate>
		<dc:creator><![CDATA[Donster]]></dc:creator>
				<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.combatsim.com/?p=6495</guid>
		<description><![CDATA[Source: GURU3D As Intel finalizes them, Microsoft started distributing Microcode updates for the Spectre variant 2, the updates now have a reach from the latest Coffee Lake processors, Kaby Lake (Core iX-7xxx and iX-8xxxU), Intel Skylake (Core iX-6xxx) up-to-now even Sandy Bridge (Core iX-2xxx). Put short, these patches will make your PC safer, even without [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><em><img class="alignright size-full wp-image-6205" src="http://www.combatsim.com/wp-content/uploads/2018/01/meltdown-and-spectre-exploits.jpg" alt="meltdown-and-spectre-exploits" width="200" height="104" />Source: GURU3D</em></p>
<p>As Intel finalizes them, Microsoft started distributing Microcode updates for the Spectre variant 2, the updates now have a reach from the latest Coffee Lake processors, Kaby Lake (Core iX-7xxx and iX-8xxxU), Intel Skylake (Core iX-6xxx) up-to-now even Sandy Bridge (Core iX-2xxx).</p>
<p>Put short, these patches will make your PC safer, even without a mandatory firmware update. To be able to retrieve the patches, you must have Windows 10 installed with build 1607/1703 or 1709. If you are on Windows 7 or 8.1, you&#8217;ll need to wait until your motherboard manufacturers if and will release a firmware update to patch the vulnerabilities.</p>
<p><a href="http://www.guru3d.com/news-story/intel-and-microsoft-release-final-spectre-patches-up-to-and-including-sandy-bridge.html">Read on&#8230;</a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.combatsim.com/2018/03/intel-and-microsoft-release-final-spectre-patches-up-to-and-including-sandy-bridge.htm/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>13 Critical Flaws Discovered in AMD Ryzen and EPYC Processors</title>
		<link>https://www.combatsim.com/2018/03/13-critical-flaws-discovered-in-amd-ryzen-and-epyc-processors.htm/</link>
		<comments>https://www.combatsim.com/2018/03/13-critical-flaws-discovered-in-amd-ryzen-and-epyc-processors.htm/#comments</comments>
		<pubDate>Tue, 13 Mar 2018 18:52:48 +0000</pubDate>
		<dc:creator><![CDATA[Donster]]></dc:creator>
				<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.combatsim.com/?p=6478</guid>
		<description><![CDATA[Source: The Hacker News Security researchers have discovered 13 critical Spectre/Meltdown-like vulnerabilities throughout AMD&#8217;s Ryzen and EPYC lines of processors that could allow attackers to access sensitive data, install persistent malware inside the chip, and gain full access to the compromised systems. All these vulnerabilities lie in the secure part of the AMD&#8217;s Zen architecture [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><em><img class="alignright size-full wp-image-6479" src="http://www.combatsim.com/wp-content/uploads/2018/03/amd-ryzenfall-masterkey-fallout-chimera.jpg" alt="amd-ryzenfall-masterkey-fallout-chimera" width="200" height="104" />Source: The Hacker News</em></p>
<p>Security researchers have discovered 13 critical Spectre/Meltdown-like vulnerabilities throughout AMD&#8217;s Ryzen and EPYC lines of processors that could allow attackers to access sensitive data, install persistent malware inside the chip, and gain full access to the compromised systems.</p>
<p>All these vulnerabilities lie in the secure part of the AMD&#8217;s Zen architecture processors and chipsets—typically where device stores sensitive information such as passwords and encryption keys and makes sure nothing malicious is running when you start your PC.</p>
<p>The unpatched vulnerabilities are categorized into four classes—<em>RYZENFALL, FALLOUT, CHIMERA, and MASTERKEY</em>—and threaten wide-range of servers, workstations, and laptops running vulnerable AMD Ryzen, Ryzen Pro, Ryzen Mobile or EPYC processors.</p>
<p>Discovered by the team of researchers at Israel-based CTS-Labs, newly disclosed vulnerabilities defeat AMD&#8217;s Secure Encrypted Virtualization (SEV) technology and could allow attackers to bypass Microsoft Windows Credential Guard to steal network credentials.</p>
<p><a href="https://thehackernews.com/2018/03/amd-processor-vulnerabilities.html">Read on&#8230;</a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.combatsim.com/2018/03/13-critical-flaws-discovered-in-amd-ryzen-and-epyc-processors.htm/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Microsoft Pushes New Software-Based Spectre, Meltdown Mitigation Patches</title>
		<link>https://www.combatsim.com/2018/03/microsoft-pushes-new-software-based-spectre-meltdown-mitigation-patches.htm/</link>
		<comments>https://www.combatsim.com/2018/03/microsoft-pushes-new-software-based-spectre-meltdown-mitigation-patches.htm/#comments</comments>
		<pubDate>Thu, 08 Mar 2018 16:13:29 +0000</pubDate>
		<dc:creator><![CDATA[Donster]]></dc:creator>
				<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.combatsim.com/?p=6444</guid>
		<description><![CDATA[Source: TechPowerUp! The Spectre/Meltdown road is long and pocked with lawsuits and security holes as it is, and Microsoft is one of the players that&#8217;s trying to put the asphalt back to tip-top, Autobahn-worth shape. The company has already improved users&#8217; security to the Meltdown and Spectre exploits on its OS side; however, hardware patches, [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><em><img class="alignright size-full wp-image-6205" src="http://www.combatsim.com/wp-content/uploads/2018/01/meltdown-and-spectre-exploits.jpg" alt="meltdown-and-spectre-exploits" width="200" height="104" />Source: TechPowerUp!</em></p>
<p>The Spectre/Meltdown road is long and pocked with lawsuits and security holes as it is, and Microsoft is one of the players that&#8217;s trying to put the asphalt back to tip-top, Autobahn-worth shape. The company has already improved users&#8217; security to the Meltdown and Spectre exploits on its OS side; however, hardware patches, and specifically BIOS-editing ones are much harder to deploy and distribute by the PC chain. That may be one of the reasons why Microsoft is now again stepping up with software-based mitigations for Intel-based systems, specifically.</p>
<p><a href="https://www.techpowerup.com/242124/microsoft-pushes-new-software-based-spectre-meltdown-mitigation-patches">Click here</a> for more information.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.combatsim.com/2018/03/microsoft-pushes-new-software-based-spectre-meltdown-mitigation-patches.htm/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Intel Finally Ready With Security Microcode Updates for Broadwell, Haswell</title>
		<link>https://www.combatsim.com/2018/03/intel-finally-ready-with-security-microcode-updates-for-broadwell-haswell.htm/</link>
		<comments>https://www.combatsim.com/2018/03/intel-finally-ready-with-security-microcode-updates-for-broadwell-haswell.htm/#comments</comments>
		<pubDate>Fri, 02 Mar 2018 19:09:20 +0000</pubDate>
		<dc:creator><![CDATA[Donster]]></dc:creator>
				<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.combatsim.com/?p=6408</guid>
		<description><![CDATA[Source: TechPowerUp! Via updated documents on its Microcode Revision guide, Intel has revealed that they have finally developed and started deploying microcode security updates for their Broadwell and Haswell-based microprocessors. The microcode update comes after a flurry of nearly platform-specific updates that aimed to mitigate known vulnerabilities in Intel&#8217;s CPUs to the exploits known as [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><img class="alignright size-full wp-image-6205" src="http://www.combatsim.com/wp-content/uploads/2018/01/meltdown-and-spectre-exploits.jpg" alt="meltdown-and-spectre-exploits" width="200" height="104" />Source: <a href="https://www.techpowerup.com/241959/intel-finally-ready-with-security-microcode-updates-for-broadwell-haswell">TechPowerUp!</a></p>
<p>Via updated documents on its Microcode Revision guide, <em>Intel</em> has revealed that they have finally developed and started deploying microcode security updates for their Broadwell and Haswell-based microprocessors. The microcode update comes after a flurry of nearly platform-specific updates that aimed to mitigate known vulnerabilities in Intel&#8217;s CPUs to the exploits known as <em>Spectre</em> and <em>Meltdown</em>.</p>
<p>While that&#8217;s good news, Intel&#8217;s patching odyssey still isn&#8217;t over, by any means. According to Intel&#8217;s documentation, the Spectre fixes for Sandy Bridge and Ivy Bridge are still in beta and are being tested by hardware partners, so that&#8217;s two other architectures that still remain vulnerable. Of course, this discussion of who&#8217;s vulnerable and isn&#8217;t really can&#8217;t be reduced to which architectures Intel has released its updates to. Users have to remember that the trickle-down process from Intel&#8217;s patch validation and distribution through manufacturers to end users&#8217; systems is a morose one, and is also partially in the hands of sometimes not too tech-savy users. Time will tell if these flaws will have any major impact in some users or businesses.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.combatsim.com/2018/03/intel-finally-ready-with-security-microcode-updates-for-broadwell-haswell.htm/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Updated Firmware Available for 6th, 7th and 8th Generation Intel Core Processors</title>
		<link>https://www.combatsim.com/2018/02/updated-firmware-available-for-6th-7th-and-8th-generation-intel-core-processors.htm/</link>
		<comments>https://www.combatsim.com/2018/02/updated-firmware-available-for-6th-7th-and-8th-generation-intel-core-processors.htm/#comments</comments>
		<pubDate>Thu, 22 Feb 2018 16:41:07 +0000</pubDate>
		<dc:creator><![CDATA[Donster]]></dc:creator>
				<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.combatsim.com/?p=6386</guid>
		<description><![CDATA[By Navin Shenoy @ Intel Over the past several weeks, we’ve been developing and validating updated microcode solutions to protect Intel customers against the security exploits disclosed by Google Project Zero. This effort has included extensive testing by customers and industry partners to ensure the updated versions are ready for production. On behalf of all of [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><em><img class="alignright size-full wp-image-6205" src="http://www.combatsim.com/wp-content/uploads/2018/01/meltdown-and-spectre-exploits.jpg" alt="meltdown-and-spectre-exploits" width="200" height="104" />By Navin Shenoy @ Intel</em></p>
<p>Over the past several weeks, we’ve been developing and validating updated microcode solutions to protect Intel customers against the security exploits disclosed by Google Project Zero. This effort has included extensive testing by customers and industry partners to ensure the updated versions are ready for production. On behalf of all of Intel, I thank each and every one of our customers and partners for their hard work and partnership throughout this process.</p>
<p>Based on these efforts, we have now released production microcode updates to our OEM customers and partners for Kaby Lake- and Coffee Lake-based platforms, plus additional Skylake-based platforms. This represents our 6th, 7th and 8th Generation Intel® Core™ product lines as well as our latest Intel® Core™ X-series processor family. It also includes our recently announced Intel® Xeon® Scalable and Intel® Xeon® D processors for data center systems.</p>
<p>The new microcode will be made available in most cases through OEM firmware updates. I continue to encourage people to always keep their systems up-to-date. There is also a comprehensive schedule and current status for planned microcode updates available online.</p>
<p><a href="https://newsroom.intel.com/news/latest-intel-security-news-updated-firmware-available/">Read on&#8230;</a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.combatsim.com/2018/02/updated-firmware-available-for-6th-7th-and-8th-generation-intel-core-processors.htm/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>More Meltdown &amp; Spectre Exploit Updates</title>
		<link>https://www.combatsim.com/2018/01/more-meltdown-spectre-exploit-updates.htm/</link>
		<comments>https://www.combatsim.com/2018/01/more-meltdown-spectre-exploit-updates.htm/#comments</comments>
		<pubDate>Tue, 30 Jan 2018 16:32:09 +0000</pubDate>
		<dc:creator><![CDATA[Donster]]></dc:creator>
				<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.combatsim.com/?p=6286</guid>
		<description><![CDATA[We’ve gathered a bit more info regarding the Meltdown security exploit, which primarily affects Intel’s CPUs, but also has been confirmed to affect some ARM CPU designs. Also the Spectre exploit that every high-performance processor ever made – Intel, AMD, ARM, and POWER – is thought to be vulnerable to. Check out the links below [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><img class="alignright size-full wp-image-6205" src="http://www.combatsim.com/wp-content/uploads/2018/01/meltdown-and-spectre-exploits.jpg" alt="meltdown-and-spectre-exploits" width="200" height="104" />We’ve gathered a bit more info regarding the Meltdown security exploit, which primarily affects Intel’s CPUs, but also has been confirmed to affect some ARM CPU designs. Also the Spectre exploit that every high-performance processor ever made – Intel, AMD, ARM, and POWER – is thought to be vulnerable to. Check out the links below for the latest news pertaining to the Meltdown and Spectre exploits.</p>
<ul>
<li><a href="http://www.guru3d.com/news-story/intel-processors-will-get-hardware-fix-for-spectre-and-meltdown-this-year.html">Intel Processors Will Get Hardware Fix for Spectre and Meltdown This Year</a></li>
<li><a href="http://www.pcgamer.com/microsoft-issues-a-windows-patch-to-disable-intels-buggy-spectre-fix/">Microsoft Issues a Windows Patch to Disable Intel’s Buggy Spectre Fix</a></li>
<li><a href="https://www.techpowerup.com/241024/intel-warned-china-of-meltdown-and-spectre-before-the-us-government">Intel Warned China of Meltdown and Spectre Before the US Government</a></li>
<li><a href="http://www.guru3d.com/news-story/google-chrome-adds-protection-against-meltdown-and-spectre.html">Google Chrome Adds Protection Against Meltdown and Spectre</a></li>
</ul>
]]></content:encoded>
			<wfw:commentRss>https://www.combatsim.com/2018/01/more-meltdown-spectre-exploit-updates.htm/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Meltdown &amp; Spectre Exploit Updates</title>
		<link>https://www.combatsim.com/2018/01/meltdown-spectre-exploit-updates.htm/</link>
		<comments>https://www.combatsim.com/2018/01/meltdown-spectre-exploit-updates.htm/#comments</comments>
		<pubDate>Thu, 18 Jan 2018 20:01:03 +0000</pubDate>
		<dc:creator><![CDATA[Donster]]></dc:creator>
				<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.combatsim.com/?p=6258</guid>
		<description><![CDATA[We&#8217;ve gathered a bit more info regarding the Meltdown security exploit, which primarily affects Intel’s CPUs, but also has been confirmed to affect some ARM CPU designs. Also the Spectre exploit that every high-performance processor ever made – Intel, AMD, ARM, and POWER – is thought to be vulnerable to. Check out the links below for the [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><img class="alignright size-full wp-image-6205" src="http://www.combatsim.com/wp-content/uploads/2018/01/meltdown-and-spectre-exploits.jpg" alt="meltdown-and-spectre-exploits" width="200" height="104" /></p>
<p>We&#8217;ve gathered a bit more info regarding the <em>Meltdown</em> security exploit, which primarily affects Intel’s CPUs, but also has been confirmed to affect some ARM CPU designs. Also the <em>Spectre</em> exploit that every high-performance processor ever made – Intel, AMD, ARM, and POWER – is thought to be vulnerable to. Check out the links below for the latest news pertaining to the <em>Meltdown</em> and <em>Spectre</em> exploits.</p>
<ul>
<li><a href="https://hexus.net/tech/news/software/114389-inspectre-meltdown-spectre-check-tool-released-grc/">InSpectre Meltdown and Spectre Check Tool Released by GRC</a></li>
<li><a href="https://www.techpowerup.com/240741/bsods-from-meltdown-and-spectre-firmware-updates-are-spreading-like-the-plague">BSODs from Meltdown and Spectre Firmware Updates Are Spreading Like the Plague</a></li>
<li><a href="https://wccftech.com/amd-class-action-law-suits-for-spectre-vulnerabilities-intel-four-meltdown/">AMD Gets Hit With Two Class Action Lawsuits For Spectre Vulnerabilities</a></li>
<li><a href="https://www.techpowerup.com/240721/adding-insult-to-injury-fake-spectre-meltdown-patch-pushes-malware-to-users">Adding Insult to Injury: Fake Spectre, Meltdown Patch Pushes Malware to Users</a></li>
<li><a href="http://www.tomshardware.com/news/motherboard-vendors-release-bios-updates-spectre,36316.html">Motherboard Vendors Release BIOS Updates For Spectre</a></li>
</ul>
]]></content:encoded>
			<wfw:commentRss>https://www.combatsim.com/2018/01/meltdown-spectre-exploit-updates.htm/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
