Security News
Evil hypervisors can work out what apps are running, extract data from encrypted guests Five boffins from four US universities have explored AMD's Secure Encrypted Virtualization (SEV) technology...
SEV code cracked to leak secret keys Microchip slinger AMD has issued a firmware patch to fix the encryption in its Secure Encrypted Virtualization technology (SEV), used to defend the memory of...
Western Digital announced the latest memory extension solution with AMD to meet the need of a growing number of customers to scale addressable memory sizes of existing servers for...
CPU slingers insist existing defenses will stop attacks – but eggheads disagree Computer security researchers have uncovered yet another set of transient execution attacks on modern CPUs that...
Disclosed earlier this year, potentially dangerous Meltdown and Spectre vulnerabilities that affected a large family of modern processors proven that speculative execution attacks can be exploited...
In the wake of Spectre and Meltdown, some organizations are diversifying their technology buys. Lenovo's new Ryzen-powered ThinkPads bring choice to business notebooks.
Virtual machines that use AMD’s hardware-based encryption scheme are vulnerable to attacks that can extract the full contents of their main memory – in plaintext.
AMD EPYC server chipsets are supposed to provide a high level of security, but a German team has managed to gain control through a hypervisor exploit.
A group of German researchers has devised a new attack method capable of bypassing AMD’s Secure Encrypted Virtualization (SEV). read more
German security researchers claim to have found a new practical attack against virtual machines (VMs) protected using AMD's Secure Encrypted Virtualization (SEV) technology that could allow...