Get a Pentest and security assessment of your IT network.

Cyber Security

Intel adds CPU-level malware protection to Tiger Lake processors

Control-Flow Enforcement Technology (Intel CET) offers protection against malware using control-flow hijacking attack methods on devices with Intel’s future Tiger Lake processors. Return Oriented Programming (ROP) and Call Oriented programming (COP) are techniques used by adversaries to bypass software and operating systems’ built-in anti-malware protections. Intel CET also extends threat protection capabilities on Intel vPro platforms that come with Intel Hardware Shield tech designed to defend against firmware-level attacks, such as Call and Jump indirect attacks.

Source: https://www.bleepingcomputer.com/news/security/intel-adds-cpu-level-malware-protection-to-tiger-lake-processors/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security