POV-Ray : Newsgroups : povray.off-topic : Intel Security Flaw Server Time
4 Dec 2024 21:12:39 EST (-0500)
  Intel Security Flaw (Message 1 to 6 of 6)  
From: Bald Eagle
Subject: Intel Security Flaw
Date: 13 Jan 2018 08:00:00
Message: <web.5a5a02295d46edd95cafe28e0@news.povray.org>
"...another serious flaw in Intel hardware, which could enable hackers to access
corporate laptops. Standard password of Intels Management Engine BIOS Extension
are rarely changed and can invoke business laptops vulnerable to unauthorized
remote access, claims F-Secure. "


http://www.guru3d.com/news-story/new-security-flaw-hits-intellaptops-this-time.html


Post a reply to this message

From: clipka
Subject: Re: Intel Security Flaw
Date: 13 Jan 2018 08:56:31
Message: <5a5a100f$1@news.povray.org>
Am 13.01.2018 um 13:57 schrieb Bald Eagle:
> "...another serious flaw in Intel hardware, which could enable hackers to access
> corporate laptops. Standard password of Intels Management Engine BIOS Extension
> are rarely changed and can invoke business laptops vulnerable to unauthorized
> remote access, claims F-Secure. "
> 
> 
> http://www.guru3d.com/news-story/new-security-flaw-hits-intellaptops-this-time.html

Rather boring, this one. Too easy to fix.


Post a reply to this message

From: Kenneth
Subject: Re: Intel Security Flaw
Date: 13 Jan 2018 14:00:01
Message: <web.5a5a56e2127e6597a47873e10@news.povray.org>
"F-Secure said once an attacker had the chance to reconfigure AMT (for which he
would initially need physical access to the device in question), the device
could be fully controlled remotely..."

I have no idea what all of that jargon means... but it looks like the safest way
to prevent this oh-so-catastrophic problem is to KEEP THE ATTACKER AWAY FROM
YOUR LAPTOP!! Don't let him in the door!

That's my profound wisdom for the day. :-P


Post a reply to this message

From: Bald Eagle
Subject: Re: Intel Security Flaw
Date: 13 Jan 2018 14:35:01
Message: <web.5a5a5eea127e65975cafe28e0@news.povray.org>
"Kenneth" <kdw### [at] gmailcom> wrote:
> "F-Secure said once an attacker had the chance to reconfigure AMT (for which he
> would initially need physical access to the device in question), the device
> could be fully controlled remotely..."
>
> I have no idea what all of that jargon means... but it looks like the safest way
> to prevent this oh-so-catastrophic problem is to KEEP THE ATTACKER AWAY FROM
> YOUR LAPTOP!! Don't let him in the door!
>
> That's my profound wisdom for the day. :-P

Sounds like excellent advice for Europe.


Post a reply to this message

From: Stephen
Subject: Re: Intel Security Flaw
Date: 13 Jan 2018 15:50:36
Message: <5a5a711c$1@news.povray.org>
On 13/01/2018 19:32, Bald Eagle wrote:
> "Kenneth" <kdw### [at] gmailcom> wrote:
>> "F-Secure said once an attacker had the chance to reconfigure AMT (for which he
>> would initially need physical access to the device in question), the device
>> could be fully controlled remotely..."
>>
>> I have no idea what all of that jargon means... but it looks like the safest way
>> to prevent this oh-so-catastrophic problem is to KEEP THE ATTACKER AWAY FROM
>> YOUR LAPTOP!! Don't let him in the door!
>>
>> That's my profound wisdom for the day. :-P
> 
> Sounds like excellent advice for Europe.
> 


Advice taken in respect to a very stable genius. From this small corner 
of Europe.

-- 

Regards
     Stephen


Post a reply to this message

From: Francois Labreque
Subject: Re: Intel Security Flaw
Date: 16 Jan 2018 10:48:53
Message: <5a5e1ee5$1@news.povray.org>

> Am 13.01.2018 um 13:57 schrieb Bald Eagle:
>> "...another serious flaw in Intel hardware, which could enable hackers to access
>> corporate laptops. Standard password of Intels Management Engine BIOS Extension
>> are rarely changed and can invoke business laptops vulnerable to unauthorized
>> remote access, claims F-Secure. "
>>
>>
>> http://www.guru3d.com/news-story/new-security-flaw-hits-intellaptops-this-time.html
>
> Rather boring, this one. Too easy to fix.

Easy, but time and resource consuming.

1. Send an e-mail to all the company's users asking them to do something 
scary and complicated.  Which they will ignore.  So you move to the next 
step.

2. Force everyone to bring their laptop in the office so that the 
technician can do it for them and check them off the list.  Travelling 
sales staff and telecommuters will complain about lost productivity and 
ask for travel expenses.  And you still have to hunt people on vacation, 
maternity leave, and those who ignore e-mails from IT.

Meanwhile, someone will leave their laptop in their bedroom, while 
visiting the in-laws at the cottage, and their nephew will enable remote 
management for the lulz.  And boom!  Anonymous is IN UR BASE KILLIN UR 
DUDEZ!

-- 
/*Francois Labreque*/#local a=x+y;#local b=x+a;#local c=a+b;#macro P(F//
/*    flabreque    */L)polygon{5,F,F+z,L+z,L,F pigment{rgb 9}}#end union
/*        @        */{P(0,a)P(a,b)P(b,c)P(2*a,2*b)P(2*b,b+c)P(b+c,<2,3>)
/*   gmail.com     */}camera{orthographic location<6,1.25,-6>look_at a }

---
This email has been checked for viruses by AVG.
http://www.avg.com


Post a reply to this message

Copyright 2003-2023 Persistence of Vision Raytracer Pty. Ltd.