Even the patch Intel released today still doesn't address all of the vulns the researchers submitted to the company - and it still leaves unfixed the core issue from which all of the vulnerabilities arise.
-
-
Prikaži ovu nit
-
The researchers say Intel asked them repeatedly to honor embargoes, then kept changing the embargoes when the patch didn't fix the problems. They say the company abused the coordinated disclosure process while deceiving users about the security of their machines.
Prikaži ovu nit -
“We think it’s time to simply tell the world that even now Intel hasn’t fixed the problem,” Herbert Bos (
@herbertbos) says. “There are tons of vulnerabilities still left, we are sure. And they don’t intend to do proper security engineering until their reputation is at stake.”Prikaži ovu nit
Kraj razgovora
Novi razgovor -
-
-
Thanks very much, Chris. That’s high praise from you and very appreciated.
- Još 2 druga odgovora
Novi razgovor -
-
-
Thanks, Sean
Kraj razgovora
Novi razgovor -
-
Intel has been playing fast and loose for years. Ignoring security researchers concerns about there products. An now it's biting them in the ass.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
I keep saying
#Intel doesn't care about your security, only their image. This is a prime example but far from the only one. This one: https://www.semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/ … has documentation I have seen where Intel directly holds back a patch they know will help people being exploited for PR.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
NYTimes byline! Wooooooo
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.