Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
7,481 results
Although difficult to exploit compared to the AMD flaw, still important to apply the microcode updates when they are released.
1,760 views
10 months ago
In this video, we take a deep dive into Spectre and Meltdown, two of the most dangerous and widespread transient execution CPU ...
719,331 views
2 months ago
There's a new security exploit in the wild affecting Intel processors codenamed Downfall (CVE-2022-40982). With potentially ...
861 views
9 months ago
A popular compression library called XZ Utils was recently backdoored by a hacker which compromised Linux distros like Debian, ...
1,188,901 views
Many will get it in various form through Windows update, some of you might need to have UEFI Firmware BIOS update to get it.
1,544 views
in this video, i got my hands a computer that i am not supposed to be able to get, on the surface it seems like a standard HP ...
1,010 views
In today's episode, we delve into the “cyber incident” that has brought CDK Global's systems to a standstill, impacting more than ...
19 views
10 hours ago
In this video, I explain why I left AMD and switched over to Intel. I share my experience with the Intel platform. This includes my ...
59,326 views
A Google Researcher named Daniel Moghimi discovered the vulnerability, dubbed “Downfall” identified as CVE-2022-40982 ...
947 views
How are vulnerabilities found and why do they appear? This is MK - today we are talking about security issues in modern chips.
1,558 views
6 months ago
Purchases made through some store links may provide some compensation to Linus Media Group. ▻ GET MERCH: ...
971,512 views
In this video I discuss the TriangleDB attack chain that allowed hackers to completely compromise iPhones starting with a zero ...
410,729 views
5 months ago
Another security flaw, this one is Intel CPU called Downfall. Another flaw to keep an eye on.
672 views
Remediating Intel Chipset Device Software Vulnerability with Tenable, SentinelOne and PowerShell Intel Chipset Device ...
278 views
In today's video, Alex Olsen talks about how he found his first bug bounty and the methodology behind it! 00:00 Intro 00:55 ...
52,469 views
It has been discovered that Intel ARC has a security flaw. We will need to wait for Intel on how they will resolve it. Another reason ...
143 views
On Security Now, Steve Gibson and Leo Laporte discuss Downfall, a new Intel processor vulnerability that leaks sensitive data ...
2,957 views
7 months ago
In this video we will use a hardware attack to bypass TPM-based Bitlocker encryption as used on most Microsoft Windows devices ...
874,310 views
4 months ago
This is a follow up video to the original latency issue video, posted nearly a month back. Many people have been upset with how ...
4,634 views
It is impossible to create perfect code, there will always be security vulnerabilities in the hardware and software we use.
630 views