- Technology that changed us: The 2000s, from iPhone to Twitter
- I still recommend this older Samsung phone to most people - here's why
- Contract intelligence comes to PDF
- Microsoft Build kicks off May 19 - here's what we know so far
- OpenAI eyes the wearables business: Robots, headsets, watches and a whole lot more
New GoFetch Vulnerability in Apple's M Chips Allows Secret Keys Leak on Compromised Computers
The newly exposed GoFetch vulnerability affecting Apple’s M1, M2 and M3 chips lets an attacker exfiltrate secret keys from cryptographic applications on a targeted system. The exploit works by running a fraudulent process on the same CPU cluster as the targeted process on the targeted machine. No easy mitigation currently exists for this vulnerability, as it resides in the hardware. What is the GoFetch vulnerability? GoFetch is a cache side-channel vulnerability. This type of vulnerability…
Read More