future CPUs are threatened by a new attack


Experts have shed light on a new cyber threat called SLAM. This technique is capable of compromising passwords on future AMD, Intel and Arm CPUs.

cpu fault amd intel
Credits: 123RF

This is not the first time processors have been affected by security breaches which allow steal information. SLAMa form of sophisticated computer attack, exploits a flaw in upcoming computers, designed to be more secure. Tech giants, such as Intel and AMD, are currently solving this problem. These future computers are equipped with advanced security featuressuch as LAM for Intel, UAI for AMD and TBI for Arm, but SLAM bypasses these protections to access sensitive data.

This threat mainly concerns computers that are not yet available on the market. It’s like a new lock being vulnerable to a picking technique. These computers use a special method to manage memory, but hackers have found a way to use it for malicious purposes. Manufacturers are currently working on fixes to strengthen the security of these future devicesbut the speed with which SLAM was discovered raises questions about the robustness of the planned security measures.

The processors affected by SLAM are:

  • THE AMD CPUs existing vulnerabilities to the referenced security flaw CVE-2020-12965
  • Futures Intel CPU equipped with security features LAM
  • Futures AMD CPUs equipped with security features UAI
  • Futures CPU Arm equipped with security features TBI

How SLAM attack compromises your personal information

Researchers have demonstrated how SLAM can extract information sensitive, such as Passwords targeted computers. It’s like someone can access your private notes without your knowledge. This attack uses a cutting-edge technique called “pointer chasing,” exploiting processor flaws to reveal sensitive information.

The processors are more and more efficient. So even if manufacturers are working on long term solutions, temporary fixes could be deployed to protect users against this threat. It is essential to stay informed of developments to ensure the security of your data. Stay attentive to security updates and manufacturers’ recommendations to minimize potential risks associated with this new threat.

Source: Bleeding Computer



Source link -101