AI moves to your PC with its own special hardware

Seeking to keep sensitive data private and accelerate AI workloads? Look no further than AI PCs powered by Intel Core Ultra processors with a built-in NPU. Running AI workloads with sensitive data in the public cloud has its disadvantages, but a new generation of laptops can now perform many of the same tasks locally, in … More AI moves to your PC with its own special hardware

ESET unveils further innovation for Intel-powered AI PCs

With cyber-attack frequency ever on the increase and new threats emerging constantly, technology leaders are collaborating on disruptive advances to better prevent, detect, and repel the latest assaults. ESET and Intel have a long history of collaboration at the front lines of this combat, and ESET is poised to launch new features based on Intel’s latest hardware-based … More ESET unveils further innovation for Intel-powered AI PCs

Malware authors already taking aim at Apple M1 Macs

The first instance of malicious code native to Apple Silicon M1 Macs emerged a month after the release of devices equipped with the company’s in-house CPUs. In November, Apple debuted a series of Mac computers sporting its new Apple Silicon M1 chips to great acclaim. The release of the new hardware also grabbed the attention … More Malware authors already taking aim at Apple M1 Macs

Thunderspy attacks: What they are, who’s at greatest risk and how to stay safe

All you need to know about preventing adversaries from exploiting the recently disclosed vulnerabilities in the Thunderbolt interface. In May 2020, Björn Ruytenberg, a computer security researcher at the Eindhoven University of Technology in the Netherlands, announced the discovery of Thunderspy, a series of vulnerabilities in the Thunderbolt technology and interrelated scenarios for changing – including disabling – … More Thunderspy attacks: What they are, who’s at greatest risk and how to stay safe

MADIoT – The nightmare after XMAS (and Meltdown, and Spectre)

In the last few months of 2017, security companies made their own forecasts about incoming cyberthreats and the measures that needed to be taken to ensure a better and cybersafer 2018, often advocating the use of protective software tools made by that vendor.  Lo and behold! 2018 started with a scenario hardly anyone could have … More MADIoT – The nightmare after XMAS (and Meltdown, and Spectre)