website statistics
A security expert said for this defect, hackers could take control of Windows and other operating systems.

Your take on Getting a SmartWatch?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading...Loading...

The U.S. Computer Emergency Readiness Team (US-CERT) has revealed a defect in 64-bit Intel chips. A security expert said for this defect, hackers could take control of Windows and other operating systems. Till now, Intel did not respond about the issue, so nothing is clear about the situation.


Hacker, Image Credit: kidapawanbloggers.com

A report has been released this week by US-CERT and they said “Some 64-bit operating systems and virtualization software running on Intel processor are vulnerable to a local privilege escalation attack. The vulnerability may be exploited for local privilege escalation or a guest-to-host virtual machine escape.”

The organization found the vulnerability in several 64-bit operating systems such as Windows 7, Windows Server 2008 R2, 64-bit versions of FreeBSD and NetBSD as well as systems that include the Xen hypervisor.

AMD processor was not affected as well as VMware’s virtualization software. Because they did not use the SYSRET instruction.

According to the Xen community blog “If an operating system is written according to AMD’s spec, but run on Intel hardware, the difference in implementation can be exploited by an attacker to write to arbitrary addresses in the operating system’s memory.”

US-CERT said alongside Microsoft and Intel, other vendors has been affected such as Joyent, Citrix, Oracle, Red Hat and SUSE Linux.

Source: Csoonline

Buy Cheapest Related Product From Amazon.com


Android 4.0.3 Now Available For Sony Tablet S And Sony Tablet P

People Died In Oregon – “Black Death” Coming Back After 650 Years?
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On June 18, 2012(3 years, 0 months ago.)

You May Also Like:

Recent Products

Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  
Compare  

What Do You Think?

Loading Disqus Comments ...
Loading Facebook Comments ...

FTC Disclosure: Some of the links of this website are "affiliate links." This means if you click on the link and purchase the item, we will receive an affiliate commission.


Recent Search

Recent Tutorials

A simple tutorial on how-to block a phone number on Android device, without an external app. Its pretty easy and straight-forward. Take a look.
Here we will show how to take Screenshot on your Apple Watch.
For too many people, the realization that they need to back up their photos and videos only comes when they misplace or break their smartphones and lose everything. Here we a report on possible solution and best tools.
Not sure if you are aware that your Wi-Fi Router Or Modem could be hacked too. Here we found a quick tips, how to check if your Router or Modem is hacked.
Our today’s tutorial is about how to change Font on Android.
Here is the tutorial about how to setup MMS on Android device.
In this tutorial I will show you how to enable Instant Upload inside your Google+ app on Android, so that you can sync your photos and videos with Google+ instantly.
Here is another tutorial for the Android lovers. I will show you how to change keyboard on Android.
Here is our new android tutorial on how to change the default launcher on Android.
Here is the tutorial about how to setup Internet settings on Android device.
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook