Please remember that any mention of competitors, hinting at competitors or offering to provide details of competitors will result in an account suspension. The full rules can be found under the 'Terms and Rules' link in the bottom right corner of your screen. Just don't mention competitors in any way, shape or form and you'll be OK.
Whats that ^^^^ ?
We are known for our extensive media relationships and network. Let us connect you with the right reporters, bloggers, analysts and influencers who will understand your business and share your perspective with the markets.
CTS-Labs list a New York based marketing firm for media inquiries which seems rather weird for such a small outfit.
This is what TrixP10 pointed out:
Wow, thats very very illegal, if Trail of Bits are behind this trying to force AMD share price down to profit off it they will end up in very hot water.
March 13 (Reuters) - An Israeli cyber security research firm with six employees on Tuesday said it had found flaws in Advanced Micro Devices microprocessors that made them vulnerable to hacks.
AMD said it was investigating the claims, which were followed by heavy trade in AMD shares. The stock closed up 1 percent to $11.64 after a day of volatile trade. AMD traded between $11.10 and $12.04 following release of the report from Tel Aviv-based CTS Labs.
CTS executives told Reuters that they had shared their findings with some clients who pay the firm for proprietary research on vulnerabilities in computer hardware. They declined to identify their clients or say when they had provided them with data on the vulnerability.
"I cant really talk about my clients," said Yaron Luk-Zilberman, chief financial officer at the firm that was founded in January 2017.
Short-seller Viceroy Research published a 25-page report on the vulnerabilities on Tuesday, betting its shares will fall.
AMD said that the report took it by surprise.
"This company was previously unknown to AMD and we find it unusual for a security firm to publish its research to the press without providing a reasonable amount of time for the company to investigate and address its findings," AMD said in a note to customers on its website.
Viceroy founder Fraser Perring told Reuters that somebody anonymously emailed him a draft of the report at about 4 p.m. on Monday. The firm spent much of the evening analyzing the situation and ended up taking a "sizeable" short position in AMD, he said.
There has been increased investor interest in AMD since the beginning of the month, with options drawing large trades that appeared to be betting on increased near-term gyrations in the shares.
Puts, options contracts that protect against a drop in the share price, were particularly active. Last week, the cumulative number of open put contracts outnumbered open calls 1.5-to-1, the most defensive this measure has been in more than two years, according to options analytics firm Trade Alert data. That measure declined slightly by Tuesday.
On Friday and Monday, short selling of AMD's stock increased by about 15 million shares, according to S3 Partners, a financial analytics firm. That brought overall short interest in the chipmaker to about 180 million shares, the most since at least 2010.
"Over the last several days there was a spike in short selling that was completely out of the norm," said Ihor Dusaniwsky, S3 Partners head of research.
New York-based cyber security firm Trail of Bits told Reuters that it had verified the findings from CTS, which paid $16,000 for a review of the AMD vulnerabilities.
A Trail of Bits analyst spent a week reviewing detailed technical reports from CTS, along with "proof of concept" code that could be used to launch attacks on computers running vulnerable AMD chips, Trail of Bits Chief Executive Dan Guido told Reuters.
"These are real security issues in AMD code and processors" that hackers could exploit to manipulate or steal secure data, he said.
For the attacks to work, an attacker must first obtain administrator access to a targeted network, Guido said. ( Reporting by Jim Finkle in Toronto, Arjun Panchadar; Additional reporting by Noel Randewich in New York, Saqib Ahmed in New York and Shariq Khan in Bengalure; Editing by Susan Thomas and Grant McCool)
Gamersnexus did a good summary of how ludricous the whole affair is:
https://www.gamersnexus.net/industry/3260-assassination-attempt-on-amd-by-viceroy-research-cts-labs
Basically whether the flaws are there are or not is one thing,but its been done in such a way AMD can't respond to any claims,let alone examine them. Intel knew for at least six months before it told anyone.
But AMD were most likely behind the spectre embargo breach
Took their time with it if so. 5 months is a long while to wait to supposedly on purpose breach an embargo to harm your competitor!
I would be gobsmacked if Intel or nVidia were involved
https://www.google.nl/maps/@32.0763...4!1sKwqghLxbTtWvbLFlfySSTA!2e0!7i13312!8i6656
Their webside from the 17-01-2018 in the way back machine, see the contact link.
https://web.archive.org/web/20180117182145/http://cts-labs.com/
They even changed their company logo a few weeks ago to make a look more like a security company.
Apparently Yaron Luk Zilberman had a Form D filing just last week for his (one-man?)
Hedge Fund just last week:
http://www.formds.com/issuers/ninewells-capital-partners-lp
https://www.sec.gov/Archives/edgar/data/1517621/000151762118000001/xslFormDX01/primary_doc.xml
CTS-Labs is "Catenoid Security" which was formally Flexagrid Systems Inc
A company that produced the Computer Hijacking "CrowdCores"
See for instance: "How to remove CrowdCores from your computer"
From their old website dated 17-01-2018:
This hijacker was used to run BitCoin mining software on the hijacked computers to make money at the expense of unsuspecting PC owners.
https://web.archive.org/web/20170130122013/http://www.crowdcores.com/FAQ.html
From the wayback machine because access to http://www.crowdcores.com/ is now blocked.