Remember that nasty exploit from a couple of months ago in Intel's Active Management Technology? In short, if your machine was already configured for remote administration, it could be vulnerable to an exploit that essentially gives an attacker complete and total control of the machine at a sub-OS level. The security hole can be closed off with a motherboard firmware update, but the exploit affects many older machines that may not be getting firmware updates. That's not the case for owners of Gigabyte boards, though. The company just announced that it will be issuing security-focused firmware updates for affected boards going back at least as far as the 8-series chipsets.
Much was made of the exploit because of how scary it could be on affected machines, but the reality is that most PCs aren't affected, since most consumer motherboards are not and cannot be configured for remote administration. If you haven't taken steps to explicitly enable AMT, you're in the clear. If you're using (or your business uses) AMT, though, make sure you have the latest firmware for your board. Updates for the GA-Q270M-D3H, GA-Q170M-D3H, GA-Q70M-MK, and GA-X170-WS ECC are going out today. Gigabyte says updates for boards using the Q270, Q170, B250, B150, and C2xx chipsets are available too, and that updates for older models "will be available shortly."
|Velocity Micro workstations harness Epyc, Threadripper, and Xeon SP||12|
|HTC readies up the Vive Standalone headset in China||0|
|Intel enjoyed strong growth in nearly all of its businesses in Q2||10|
|AMD's Wraith Max CPU cooler is now available in stores||7|
|Take your Pants for a Walk Day Shortbread||18|
|Toshiba puts 64-layer flash to work in the TR200 SSDs||3|
|Threadripper CPUs sneak into pre-built PC listings||19|
|AMD's Ryzen 3 1300X and Ryzen 3 1200 CPUs reviewed||67|
|Silverstone shines RGB LEDs on the Mini-ITX RVZ03 chassis||10|
|edit: i'm not funny||+46|