Go Back   HWBOT forum > News > GIGABYTE Tech Daily

GIGABYTE Tech Daily A group of motherboard tech nerds working at GIGABYTE headquarters in Taipei, Taiwan sharing their insider knowledge and general ramblings of the motherboard business, the tech industry in general, latest technologies and trends as well as other assorted random odds and ends.

Reply
 
Thread Tools Display Modes
  #1  
Old 1 Week Ago
hwbotrss hwbotrss is offline
robot overlord
 
Join Date: Sep 2010
Posts: 108,674
Thanks: 0
Thanked 17 Times in 17 Posts
hwbotrss is on a distinguished road
Default GIGABYTE Safeguards Users From Speculative Execution Vulnerability

Published: 01-12-2018 05:50
Author: noreply@blogger.com (Dino)

We want to make an announcement that all our major platforms have received bios updates to keep your systems protected against Speculative Execution Vulnerability threats.

Taipei, Taiwan, January 11st, 2018 – GIGABYTE TECHNOLOGY Co. Ltd, a leading manufacturer of motherboards and graphics cards, has promptly implemented safety and precautionary measures aligned with Intel®’s response to safeguard customers against security vulnerabilities on systems utilizing Speculative Execution and indirect branch prediction.

The newly released BIOS updates from GIGABYTE integrate the latest Intel advised CPU Microcode versions to mitigate issues potentially caused by the security vulnerability. Customers who have purchased a GIGABYTE board are strongly recommended to visit the GIGABYTE official website immediately for the latest BIOS updates. Please refer to the following micro link for the list of available BIOS updates by models (currently offers updates for models that support 6th/7th/8th generation Intel® Core™ processors and X99/X299 platform): https://www.gigabyte.com/MicroSite/4...-sa-00088.html

The security vulnerability arises from a new side-channel analysis method developed by external researchers that gathers information by observing the physical behavior of certain processing techniques that are common to modern computing platforms. Malicious code using this method and running locally on a normally operating platform could infer data values from memory. Based on GIGABYTE and Intel’s current assessment of these exploits we believe that they do not have the potential to corrupt, modify or delete data.

After being notified about this industry-wide potential security issue, GIGABYTE is working with our silicon providers in developing solutions to mitigate these issues as soon as reasonably possible. Updated software and firmware mitigations should be available in the next few days and will continue to be released over the next few weeks.

For more information on the Intel security vulnerabilities, please visit the Intel Security Center website for further details: https://security-center.intel.com/ad...nguageid=en-fr

Any issues affecting the user’s experience with GIGABYTE motherboards is of the utmost importance. GIGABYTE is committed to fulfilling the highest standards for quality and service of its motherboards.

To learn more about GIGABYTE: http://www.gigabyte.com


More...
Reply With Quote
Reply


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
[AT] GIGABYTE to Launch the X399 Designare EX: An AMD Motherboard Supporting Thunderbolt 3 add-in Cards hwbotrss Tech News RSS 0 09-19-2017 20:11
[AT] AT20 Giveaway Day 16.5: Gigabyte Provides Your Next Z170 Motherboard hwbotrss Tech News RSS 0 05-17-2017 19:10
GIGABYTE March OC Madness Contest Results from HWBOT.org hwbotrss GIGABYTE Tech Daily 0 04-10-2017 15:30
GIGABYTE Announces AM4 Ryzen™ Support hwbotrss GIGABYTE Tech Daily 1 03-25-2017 13:28
GIGABYTE Launches New AORUS Gaming Motherboards hwbotrss GIGABYTE Tech Daily 0 01-06-2017 09:13


All times are GMT +1. The time now is 13:55.


Powered by vBulletin® Version 3.8.4
Copyright ©2000 - 2018, Jelsoft Enterprises Ltd.
Copyright HWBOT 2004 - 2015