Remember that nasty exploit from a couple of months ago in Intel's Active Management Technology? In short, if your machine was already configured for remote administration, it could be vulnerable to an exploit that essentially gives an attacker complete and total control of the machine at a sub-OS level. The security hole can be closed off with a motherboard firmware update, but the exploit affects many older machines that may not be getting firmware updates. That's not the case for owners of Gigabyte boards, though. The company just announced that it will be issuing security-focused firmware updates for affected boards going back at least as far as the 8-series chipsets.
Much was made of the exploit because of how scary it could be on affected machines, but the reality is that most PCs aren't affected, since most consumer motherboards are not and cannot be configured for remote administration. If you haven't taken steps to explicitly enable AMT, you're in the clear. If you're using (or your business uses) AMT, though, make sure you have the latest firmware for your board. Updates for the GA-Q270M-D3H, GA-Q170M-D3H, GA-Q70M-MK, and GA-X170-WS ECC are going out today. Gigabyte says updates for boards using the Q270, Q170, B250, B150, and C2xx chipsets are available too, and that updates for older models "will be available shortly."
|Break records with EVGA's GTX 1080 Ti Kingpin Hydro Copper Gaming||11|
|Intel patches new vulnerabilities in its Management Engine||16|
|National Stuffing Day Shortbread||16|
|Tuesday deals: a 4K monitor, a 1 TB SSD, and much more||18|
|Cooler Master MasterKeys MK750 goes for a minimalist style||3|
|Marvell takes Cavium under its wing for $6 billion||2|
|Deals of the day: Ryzen and Threadripper CPUs on the cheap and more||37|
|Aorus K9 Optical keyboard senses strokes with infrared light||15|
|ROG Strix XG32VQ and XG35VQ fuse fast VA panels with FreeSync||21|
|Working on it.||+17|