Intel continues to have a Plundervolt security vulnerability that reduces CPU voltage
Recently, a cyber security research group announced a security vulnerability affecting Intel microprocessors. The flaw was first discovered by the team in June 2019 and notified Intel.
The hole, called 'Plundervolt', is a combination of the words 'plunder' and 'undervolt'. Plundervolt disables security when it performs encrypted computing tasks by reducing the voltage (undervolt) supplied to the processor.
Unlike previous security holes, Plundervolt will change bits of data right from within the processor before they are written to memory.
According to the researchers, this vulnerability is extremely dangerous because hackers can use it to perform this attack remotely.
After receiving the vulnerability report, Intel worked with motherboard and OEM manufacturers to remedy this situation. A BIOS update with a new microcode will be released soon.
In January 2018, Intel also faced two security holes, Specter and Meltdown at the same time. The fix patch then caused the CPU performance to drop, causing Intel to turn it off and work with Microsoft to release another emergency patch.
- An extremely dangerous vulnerability on Android phones allows bad guys to track users even when the phone is off the screen
- Warning: Google Chrome is experiencing serious security errors, patch updates right away
- Detecting 2 extremely serious security holes in rConfig, no patch yet
You should read it
- Serious security vulnerability on Intel chips
- AMD and ARM both warned of security flaws like Intel processors
- New dangerous vulnerability in Intel CPU: Works like Specter and Meltdown, threatening all PCs and the cloud
- Intel's chip has eight new serious vulnerabilities
- Foreshadow - the fifth most serious security hole in the CPU in 2018
- The new vulnerability on Intel allows hackers to take control of your computer within 30 seconds
- Intel has overcome serious vulnerabilities in graphics drivers for Windows
- Find security holes on every site with Nikto
- How to protect your computer against a Foreshadow security vulnerability
- HP publishes a series of critical vulnerabilities in the Teradici PCoIP protocol
- IBM developed a new technology to patch security holes
- The Mail app on iOS has serious vulnerabilities
Maybe you are interested
iPhone security tips you're missing out on
This list of common passwords shows how little we understand about online security
Download free Windows Server 2025 security guide
5 Misconceptions About Password Security
Should I buy a USB, Bluetooth or NFC security key?
4 Security Steps to Follow When Using Remote Access Applications