Remember that nasty exploit from a couple of months ago in Intel's Active Management Technology? In short, if your machine was already configured for remote administration, it could be vulnerable to an exploit that essentially gives an attacker complete and total control of the machine at a sub-OS level. The security hole can be closed off with a motherboard firmware update, but the exploit affects many older machines that may not be getting firmware updates. That's not the case for owners of Gigabyte boards, though. The company just announced that it will be issuing security-focused firmware updates for affected boards going back at least as far as the 8-series chipsets.
Much was made of the exploit because of how scary it could be on affected machines, but the reality is that most PCs aren't affected, since most consumer motherboards are not and cannot be configured for remote administration. If you haven't taken steps to explicitly enable AMT, you're in the clear. If you're using (or your business uses) AMT, though, make sure you have the latest firmware for your board. Updates for the GA-Q270M-D3H, GA-Q170M-D3H, GA-Q70M-MK, and GA-X170-WS ECC are going out today. Gigabyte says updates for boards using the Q270, Q170, B250, B150, and C2xx chipsets are available too, and that updates for older models "will be available shortly."
|Silverstone shines RGB LEDs on the Mini-ITX RVZ03 chassis||1|
|Radeon Software Crimson ReLive Edition 17.7.2 boasts refinements galore||5|
|Cooler Master gives the MasterBox Lite 5 case an RGB makeover||1|
|USB 3.2 spec pushes bandwidth up to 20 Gbps||38|
|Razer Tiamat 7.1 V2 headset packs ten drivers for immersive audio||12|
|EVGA unleashes the GTX 1080 Ti K|ngp|n graphics card||22|
|Corsair sells a majority stake to private equity for $525 million||66|
|AMD turned a $25 million operating profit in Q2 2017||90|
|Rumor: Radeon RX Vega benched in 3DMark Fire Strike||58|
|edit: i'm not funny||+28|