Skip to main content

Intel Says 'Tiger Lake' Will Drown Control-Flow Malware

The next generation of Intel mobile processors will include malware protection built into the chip. The protection, provided by Intel's Control-Flow Enforcement Technology, will first be available in the company's "Tiger Lake" mobile processors. CET is designed to protect against the misuse of legitimate code through control-flow hijacking attacks, which is widely used in large classes of malware. Of the 1.097 vulnerabilities Trend Micro discovered through its Zero Day Initiative from 2019 to today, 63.2 percent were related to memory safety.

from TechNewsWorld https://ift.tt/3e8y7AN

Comments

Popular posts from this blog

Manifesto Hatched to Close Gap Between Business and IT

The BizOps Coalition hopes to bridge the gap between technology investments and business outcomes through an effort called the BizOps Manifesto. The BizOps movement has gained traction with leading organizations, helping them to better align IT with business outcomes. But more needs to be done. That led to the Manifesto's creation. from TechNewsWorld https://ift.tt/35oXxXx

Protecting Kids From Immersive Tech Could Lead to Over-Censorship

Attempts to protect children's safety in the two-dimensional realm of online social media could adversely impact the 3D world of augmented and virtual reality, according to a newly released report by a technology think tank. The post Protecting Kids From Immersive Tech Could Lead to Over-Censorship appeared first on TechNewsWorld . from TechNewsWorld https://ift.tt/iroRM6I

Grocery Home Delivery May Ride on Cold Chain Technology

The innovative Phononic EV might be driving a new solution to deliver groceries efficiently and sustainably and, at the same time, rival Amazon’s planned aerial grocery delivery drone package delivery system. The post Grocery Home Delivery May Ride on Cold Chain Technology appeared first on TechNewsWorld . from TechNewsWorld https://ift.tt/i1FKbG9