{"id":108777,"date":"2020-06-17T00:42:50","date_gmt":"2020-06-17T07:42:50","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2020\/06\/intel-tiger-lake-to-have-built-in-malware-defense"},"modified":"2020-06-17T00:42:50","modified_gmt":"2020-06-17T07:42:50","slug":"intel-tiger-lake-to-have-built-in-malware-defense","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2020\/06\/intel-tiger-lake-to-have-built-in-malware-defense","title":{"rendered":"Intel Tiger Lake to have built-in malware defense"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/intel-tiger-lake-to-have-built-in-malware-defense.jpg\"><\/a><\/p>\n<p>Intel Corporation announced Monday that its forthcoming Tiger Lake processors will pack a defense mechanism against Spectre-type malware attacks.<\/p>\n<p>Spectre vulnerabilities allowed hackers to break into systems using Intel processors manufactured over two decades and steal passwords, personal photos, emails and other sensitive data stored in the memory of other running programs.<\/p>\n<p>Such <a href=\"https:\/\/techxplore.com\/tags\/control-flow\/\" rel=\"tag\" class=\"\">control-flow<\/a> hijacking attacks have always been difficult to mitigate through <a href=\"https:\/\/techxplore.com\/tags\/software+programs\/\" rel=\"tag\" class=\"\">software programs<\/a>. Intel\u2019s new Control-Flow Enforcement Technology (Intel CET) will install CPU-level defense mechanisms to combat such assaults.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Intel Corporation announced Monday that its forthcoming Tiger Lake processors will pack a defense mechanism against Spectre-type malware attacks. Spectre vulnerabilities allowed hackers to break into systems using Intel processors manufactured over two decades and steal passwords, personal photos, emails and other sensitive data stored in the memory of other running programs. Such control-flow hijacking [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-108777","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/108777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=108777"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/108777\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=108777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=108777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=108777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}