Please login or sign up to post and edit reviews.
272-Processor Attacks Explained
Publisher |
Michael Bazzell
Media Type |
audio
Podknife tags |
Cybersecurity
Technology
Categories Via RSS |
Technology
Publication Date |
Jul 29, 2022
Episode Duration |
00:55:30
This week Paul Asadoorian joins me to explain vulnerabilities within our computer processors with potential solutions. Direct support for this podcast comes from our privacy services, online training, and new books for 2022: Extreme Privacy (4th Edition) and  Open Source Intelligence Techniques (9th Edition). More details can be found at IntelTechniques.com. Thank you for keeping this show ad-free and sponsor-free. Listen to PAST episodes at https://inteltechniques.com/podcast.html SHOW NOTES: INTRO: None NEWS & UPDATES: https://inteltechniques.com/tools/ https://inteltechniques.com/workbook.html https://unredactedmagazine.com/ PROCESSOR ATTACKS EXPLAINED: Paul Asadoorian https://twitter.com/securityweekly https://eclypsium.com/2022/07/26/firmware-security-realizations-part-1-secure-boot-and-dbx/ https://github.com/mjg59/mei-amt-check https://github.com/chipsec/chipsec.git https://github.com/intel/INTEL-SA-00075-Linux-Detection-And-Mitigation-Tools https://github.com/ptresearch/mmdetect https://github.com/corna/me_cleaner/ Free Guides: https://inteltechniques.com/links.html Affiliate Links: Extreme Privacy (4th): https://amzn.to/3D6aiXp ProtonMail: https://go.getproton.me/aff_c?offer_id=7&aff_id=1519 ProtonVPN: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=277 PIA Dedicated IP VPN: https://www.privateinternetaccess.com/ThePSOSHOW SimpleLogin Masked Email: https://simplelogin.io?slref=osint Silent Pocket Bags & Wallets: https://slnt.com/discount/IntelTechniques

This episode currently has no reviews.

Submit Review
This episode could use a review!

This episode could use a review! Have anything to say about it? Share your thoughts using the button below.

Submit Review