News Posts matching #AMT (Active Management Technology)

Return to Keyword Browsing

MINISFORUM Announces Mini WorkStation MS-01

MINISFORUM's first Mini WorkStation MS-01, is officially available for pre-order on the official store. Tailored for tech-savvy gamers, this high-performance Mini WorkStation boasts the fastest network speed, strongest expansion capabilities, and maximum storage. It offers options with Intel Core i9-13900H and i9-12900H processors, starting at a price of $549 USD.

The MS-01 is powered by the Intel 13th generation's most robust mobile Core i9 processor, the i9-13900H, featuring 14 cores and 20 threads, a base frequency of 2.6 GHz, and a turbo boost frequency of 5.4 GHz. With the integrated 96EU Intel Iris Xe graphics, running at up to 1.5 GHz, it delivers outstanding flagship performance for tasks ranging from daily graphics processing to video production. In addition to its impressive performance, the MS-01 boasts a plethora of interfaces, enabling network transfer speeds of up to 65 Gbps, making it the fastest Mini PC in terms of network speed of MINISFORUM.

Intel Announces 12th Gen Core Processors with vPro

Intel today launched its 12th Gen Core Processors with vPro. Released across the company's mobile and desktop product lines, these processors are targeted at pre-built commercial desktops and commercial notebooks that companies typically issue their employees, which come with a host of security and remote-management features suitable to a large corporate environment. With this generation, Intel is bringing vPro to even more market segments, including ultraportables designed under the Intel Evo banner; a new breed of enterprise-grade Chromebooks for businesses built entirely on the Chrome OS platform and cloud-based apps; and for the first time, an SMB version of vPro called vPro Essentials, which will make it to entry-level Core i5 processors with vPro.

Security, Productivity, and Future-readiness form the three areas in which Intel innovated for 12th Gen Core processors with vPro. The company added new capabilities for Threat Detection Technology, which can detect ransomware and supply-chain attacks, and can work with various endpoint security software. Intel Hardware Shield technology prevents attacks from "below" the software (below ring-0, or at the firmware, microcode, or hardware levels). This is achieved through hardware-accelerated virtualization and encryption of the entire software environment. Hardware-based protections extend to vPro Enterprise for Chrome.

Intel Patches Remote Execution Flaw on Its CPUs - Active Since 2008

A bug in Intel's AMT (Active Management Technology), ISM (Standard Manageability) and SBT (Small Business Technology) firmware versions 6 to 11.6 sits unpatched since 2008 - a bug which allows "an unprivileged attacker to gain control of the manageability features provided by these products." Potentially, this could have led systems to be exploited for remote control and spyware infection (and maybe it did lead to that, and we just don't know about it.) Through this flaw, hackers could log into a vulnerable computer's hardware - outside the security features of the OS and any anti-virus suites - and silently install malware and other thriving pieces of malevolent coding. AMT having direct access to the computer's network hardware ensures this could have been done outside of local tampering. The vulnerable AMT service is part of Intel's vPro suite of processor features, so it's catering more to businesses and server boxes than for the usual consumer-based products - though we all know some hardware enthusiast's usage of this kind of processors in their personal rigs. If you don't have vPro or AMT present at all, you are in the clear. However, some outlets report that Intel systems are vulnerable to direct hardware access even if their AMT, ISM, or SBT implementations aren't provisioned - it's just the network access that doesn't work.

These insecure management features have been available in various Intel chipsets for nearly a decade, starting with the Nehalem Core i7 in 2008, all the way up to this year's Kaby Lake Core parts. Luckily, this "feature", which is present in millions of Intel chips and potentially provides a "backdoor-esque" entry point to equal millions of systems, appears to be able to be addressed through a microcode update. However, this update will have to be pushed by your system manufacturer, and you can probably begin to imagine by now how such a process will linger on, and how hard it will be for this to happen to every affected system.
Return to Keyword Browsing
Jun 3rd, 2024 04:37 EDT change timezone

New Forum Posts

Popular Reviews

Controversial News Posts