Soldato
- Joined
- 11 Mar 2013
- Posts
- 5,451
Hope this gets sorted quickly?
https://www.overclock3d.net/news/cp...s_are_vulnerable_to_a_usb_debugging_exploit/1
https://www.overclock3d.net/news/cp...s_are_vulnerable_to_a_usb_debugging_exploit/1
Please remember that any mention of competitors, hinting at competitors or offering to provide details of competitors will result in an account suspension. The full rules can be found under the 'Terms and Rules' link in the bottom right corner of your screen. Just don't mention competitors in any way, shape or form and you'll be OK.
Positive Technologies, a security vendor, has discovered that some of Intel's new CPUs have a debugging interface that can be accessed through USB 3.0 ports. This provides the hacker - and at the point of using as USB flash drive, any person in the world that can hold a USB stick in their hands - full control over the PC. Worse yet, it is completely undetectable by current security tools.
Read more: http://www.tweaktown.com/news/55828...ll-system-control-over-usb/index.html[/quote]
this includes kaby lake as well
Pretty sure autorun has been disabled by default for a number of years now (one of the XP service packs I think?)Doesn't necessarily require physical access when most people don't disable autorun and pick up random USB keys they find on the ground ..
Actually yes you are right. However I think there are potential ways around that (for example reprogramming a USB drive to act as a HID, or Stuxnet used a zero-day vulnerability in LNK files)Pretty sure autorun has been disabled by default for a number of years now (one of the XP service packs I think?)
Doesn't necessarily require physical access when most people don't disable autorun and pick up random USB keys they find on the ground ..
Doesn't necessarily require physical access when most people don't disable autorun and pick up random USB keys they find on the ground ..
This already came up... requires physical access to a USB port.