<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>meltdown &#8211; EFR Technology Group</title>
	<atom:link href="https://www.efrtechgroup.com/category/meltdown/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.efrtechgroup.com</link>
	<description>We maintain technology so you don't have to!</description>
	<lastBuildDate>Wed, 15 May 2019 06:40:00 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.efrtechgroup.com/wp-content/uploads/2019/02/cropped-EFRTG-color-2-32x32.jpg</url>
	<title>meltdown &#8211; EFR Technology Group</title>
	<link>https://www.efrtechgroup.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Install updates now to address a vulnerability in most Intel CPUs</title>
		<link>https://www.efrtechgroup.com/tech/install-updates-now-to-address-a-vulnerability-in-most-intel-cpus/</link>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Wed, 15 May 2019 06:40:00 +0000</pubDate>
				<category><![CDATA[exploit]]></category>
		<category><![CDATA[fallout]]></category>
		<category><![CDATA[gear]]></category>
		<category><![CDATA[Intel]]></category>
		<category><![CDATA[mds]]></category>
		<category><![CDATA[meltdown]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[patch]]></category>
		<category><![CDATA[personal computing]]></category>
		<category><![CDATA[personalcomputing]]></category>
		<category><![CDATA[ridl]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[spectre]]></category>
		<category><![CDATA[speculative execution]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[zombieload]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/install-updates-now-to-address-a-vulnerability-in-most-intel-cpus/</guid>

					<description><![CDATA[[ad_1] If you have a computer using an Intel CPU released since 2011 then congratulations &#8212; you&#8217;ve likely won a vulnerability, since only &#8220;select&#8221; 8th and 9th gen Core CPUs as well as 2nd generation Xeon Scalable CPUs have hardware protection against the attacks. Patching the holes will require a combination of firmware updates and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
</p>
<div>
<p>  <center><iframe allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/KAgoDQmod1Y" width="560"></iframe></center></p>
<p>If you have a computer using an Intel CPU released since 2011 then congratulations &#8212; you&#8217;ve likely won a vulnerability, since only &#8220;select&#8221; 8th and 9th gen Core CPUs as well as 2nd generation Xeon Scalable CPUs have hardware protection against the attacks.</p>
<p>Patching the holes will require a combination of firmware updates and software updates. <a href="https://support.apple.com/en-us/HT210107">macOS</a>, <a href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv190013">Windows</a>, <a href="https://www.chromium.org/Home/chromium-security/mds">ChromeOS</a> and <a href="http://lkml.iu.edu/hypermail/linux/kernel/1905.1/05371.html">Linux</a> already have software updates to address MDS attacks, while Intel has also released microcode updates for some of its hardware (<a href="https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf">PDF</a>) that you should get through motherboard and system vendors. Just like Spectre and Meltdown, the fixes are expected to impact performance &#8212; you can get more information on how much right here.</p>
<p><center><iframe allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/Oeb-O4yKK2c" width="560"></iframe></center></p></div>
<p>[ad_2]<br />
<br /><a href="https://www.engadget.com/2019/05/15/intel-mds-exploit/">Source link </a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
