Browsing Posts in Sicurezza

Reading Time: 5 minutesMeltdown and Spectre are critical vulnerabilities existing in several modern CPU: these hardware bugs allow programs to steal data which is currently processed on the computer. Meltdown and Spectre can affect personal computers, mobile devices, server and several cloud services. Actually, the only way to minimize those security risks is to apply different type of patches at different levels, including operating systems, the hypervisor , the hardware level, …

Reading Time: 8 minutesMeltdown and Spectre are critical vulnerabilities existing in several modern CPU: these hardware bugs allow programs to steal data which is currently processed on the computer. Meltdown and Spectre can affect personal computers, mobile devices, server and several cloud services. Actually, the only way to minimize those security risks is to patch your operating systems or the hypervisor level (if you are using virtual machines).

Reading Time: 6 minutesMeltdown e Spectre sono delle vulnerabilità alquanto serie che affliggono la maggior parte dei processori esistenti sul mercato, rendendo quindi potenzialmente attaccabili sistemi come personal computer, server, dispositivi mobile, ma anche molti servizi di tipo cloud. Al momento, l’unico modo per minimizzare l’effeto di questi problemi è aggiornare sia i sistemi operativi che gli eventuali hypervisor. In realtà stanno arrivando anche i primi microcode (aggiornamenti del firmware delle CPU) da parte di alcuni hardware vendor.

Reading Time: 5 minutesMeltdown and Spectre are critical vulnerabilities existing in several modern CPU: these hardware bugs allow programs to steal data which is currently processed on the computer. Meltdown and Spectre can affect personal computers, mobile devices, server and several cloud services. Actually, the only way to minimize those security risks is to patch your operating systems and the hypervisor level (if you are using virtual machines).

Reading Time: 7 minutesDopo poche settimane dalla scoperta di una possibile falla di sicurezza nei processori Intel, tra l’altro non ancora completamente risolta visto che impatta anche i nuovi processori Skylake, ci sono delle nuove minacce a livello hardware. Meltdown e Spectre sono delle vulnerabilità alquanto serie che affliggono la maggior parte dei processori esistenti sul mercato, rendendo quindi potenzialmente attaccabili sistemi come personal computer, server, dispositivi mobile, ma anche molti servizi di tipo cloud. Queste vulnerabilità riguardano molte famiglie di CPU, incluse quelle di AMD, ARM e Intel, e poiché lavorano ad un basso livello, qualunque sistema […]

Reading Time: 2 minutesAfter the release of VMware NSX-T v2.0 only three months ago, now VMware has released the new version: NSX-T v2.1, that will enable advanced networking and security across these emerging app architectures, just as it does for traditional 3-tier apps. More specifically, NSX-T 2.1 will serve as the networking and security platform for the recently announced VMware Pivotal Container Service (PKS), a Kubernetes solution jointly developed by VMware and Pivotal in collaboration with Google. NSX-T 2.1 will also introduce integration with the latest 2.0 release of Pivotal Cloud Foundry (PCF), serving as the networking and security engine behind PCF. In these environments, NSX-T will provide Layer […]

Reading Time: 3 minutesIn response to issues identified by external researchers, Intel has performed an in-depth comprehensive security review of our Intel® Management Engine (ME), Intel® Server Platform Services (SPS), and Intel® Trusted Execution Engine (TXE) with the objective of enhancing firmware resilience. As a result on 20th Nov 2017, Intel has identified security vulnerabilities that could potentially place impacted platforms at risk. In response to issues identified by external researchers, Intel has performed an in-depth comprehensive security review of its Intel® Management Engine (ME), Intel® Trusted Execution Engine (TXE), and Intel® Server Platform Services (SPS) with the […]

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright