The only thing "special" here is that this appeared on Bruce Schneier's
Cryptogram newsletter that was published today. A well-written, often
fascinating, "free monthly newsletter providing summaries, analyses,
insights, and commentaries on security: computer and otherwise."

Back issues are available at <http://www.schneier.com/crypto-gram.html>.
To subscribe, visit <http://www.schneier.com/crypto-gram.html> or send a
blank message to [EMAIL PROTECTED]

Crypto-Gram also has an RSS feed at
<http://www.schneier.com/crypto-gram-rss.xml>.

        Rony

> -----Original Message-----
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf Of Muli Ben-Yehuda
> Sent: Sunday, August 15, 2004 17:01
> To: Danny Lieberman (Barak)
> Cc: [EMAIL PROTECTED]
> Subject: Re: Interesting AMD security vulnerability
> 
> 
> On Sun, Aug 15, 2004 at 05:05:47PM +0200, Danny Lieberman 
> (Barak) wrote:
> 
> > Here's an interesting hardware security vulnerability.  
> Turns out that
> > it's possible to update the AMD K8 processor (Athlon64 or Opteron) 
> > microcode.  And, get this, there's no authentication check.  
> 
> I don't see what's special about AMD here? you can do ucode 
> updates on Intel CPUs as well. 
> 
> Cheers, 
> Muli
> -- 
> Muli Ben-Yehuda
> http://www.mulix.org | http://mulix.livejournal.com/
> 
> 


=================================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]

Reply via email to