hardware fixes for the Spectre and Meltdown bugs which emerged in recent years . In particular , it ’ s the new K-series of gaming CPUs that are receivingVulnerability-related.PatchVulnerabilitythe fix . Those chips come with changes at the hardware level and should be far more secure against the kind of attacks that Spectre and its ilk have brought to light in recent years . Although they are still based on the same 14nm node that has dominated Intel ’ s chip designs since 2014 , these would be the first ones to come withVulnerability-related.PatchVulnerabilitya fix for these sorts of bugs at the hardware level . The second set of new 9th-gen chips , the X-series ( and Xeon-class chips ) , don’t haveVulnerability-related.PatchVulnerabilitythose same security fixes . Because they ’ re based on the older Skylake-X architecture , Intel is relying solely on software updates to keep them protected againstVulnerability-related.PatchVulnerabilitythese possible vulnerabilities . News of the fixes were shared at Intel ’ s recent desktop press event , where it stated that , “ the new desktop processors include protections for the security vulnerabilities commonly referred to as ‘ Spectre , ’ ‘ Meltdown , ’ and ‘ L1TF. ’ These protections include a combination of the hardware design changes we announced earlier this year as well as software and microcode updates. ” The hardware alterations made to the chips protect against Meltdown V3 , otherwise known as the rogue data cache load bug . The L1 terminal fault exploit was also shored up with hardware changes . Software and microcode changes protect those same chips against the Spectre V2 branch target injection bug , the Meltdown V3 , a rogue system register read , and the variant V4 speculative store bypass flaw . In the laptop world , Intel has had a similar approach toward making hardware-level fixes . Some , but not all , have implemented hardware protections . Intel has been criticized in the past for the way it has handled these potentially critical flaws and has had a relatively slow move toward patchingVulnerability-related.PatchVulnerabilitythe vulnerabilities on a hardware level throughout 2018 .
Intel ’ s newly announced 9-series CPUs bring a lot of exciting new features to the table , including higher clock speeds and the promise of greater gaming performance . But arguably one of the most important factors is in security . These chips are the first generation of new desktop CPUs to come withVulnerability-related.PatchVulnerabilityhardware fixes for the Spectre and Meltdown bugs which emerged in recent years . In particular , it ’ s the new K-series of gaming CPUs that are receivingVulnerability-related.PatchVulnerabilitythe fix . Those chips come with changes at the hardware level and should be far more secure against the kind of attacks that Spectre and its ilk have brought to light in recent years . Although they are still based on the same 14nm node that has dominated Intel ’ s chip designs since 2014 , these would be the first ones to come withVulnerability-related.PatchVulnerabilitya fix for these sorts of bugs at the hardware level . The second set of new 9th-gen chips , the X-series ( and Xeon-class chips ) , don’t haveVulnerability-related.PatchVulnerabilitythose same security fixes . Because they ’ re based on the older Skylake-X architecture , Intel is relying solely on software updates to keep them protected againstVulnerability-related.PatchVulnerabilitythese possible vulnerabilities . News of the fixes were shared at Intel ’ s recent desktop press event , where it stated that , “ the new desktop processors include protections for the security vulnerabilities commonly referred to as ‘ Spectre , ’ ‘ Meltdown , ’ and ‘ L1TF. ’ These protections include a combination of the hardware design changes we announced earlier this year as well as software and microcode updates. ” The hardware alterations made to the chips protect against Meltdown V3 , otherwise known as the rogue data cache load bug . The L1 terminal fault exploit was also shored up with hardware changes . Software and microcode changes protect those same chips against the Spectre V2 branch target injection bug , the Meltdown V3 , a rogue system register read , and the variant V4 speculative store bypass flaw . In the laptop world , Intel has had a similar approach toward making hardware-level fixes . Some , but not all , have implemented hardware protections . Intel has been criticized in the past for the way it has handled these potentially critical flaws and has had a relatively slow move toward patchingVulnerability-related.PatchVulnerabilitythe vulnerabilities on a hardware level throughout 2018 .
The Australian Securities and Investments Commission has issued a warning after scammers posing asAttack.Phishingthe regulator emailed Australian businesses on Wednesday morning with malware-laden notices . The emails reportedly asked customers to renew their business details via provided links , which , when clicked , would activate a Javascript dropper and infect computers with malware . Email security vendor MailGuard issued an alert suggesting a stolen ID may have been used to help set up the scam . The originating domain , austgov.com , was registered in China , where strict regulations around domain registration require an authentic ID to be scanned . MailGuard also said the domain was backed by a legitimate email infrastructure , which helped the emails bypass email server spam detection . The emails come withAttack.PhishingASIC and Australian Government branding and puts anyone who follows their instructions at risk . ASIC recommends users keep antivirus software up to date , be wary of emails that do not address recipients by name or that spell recipients ’ names incorrectly and be suspicious of emails with unknown attachments .