More

    AMD VM security tools can be bypassed, letting hackers infilitrate your devices, experts warn




    • University researchers find way to trick AMD’s secure VM tech into sharing sensitive information
    • AMD released a security advisory with recommended mitigations
    • The bug requires physical access, but in some scenarios could be abused through software alone

    AMD Virtual Machine (VM) security tools can be bypassed, allowing cybercriminals to infiltrate devices and steal sensitive data, experts have warned.

    Security researchers from multiple universities in the EU and the UK outlined how AMD chips come with Secure Encrypted Virtualization (SEV), a security feature designed to encrypt virtual machine (VM) memory to protect it from unauthorized access, including by the hypervisor or other VMs. SEV uses hardware-based encryption keys unique to each VM, ensuring data remains confidential and tamper-proof even in shared environments.

    https://cdn.mos.cms.futurecdn.net/TWkP7ZurZMY6uepDxsK6Ha-1200-80.jpg



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    Leave a reply

    Please enter your comment!
    Please enter your name here

    spot_imgspot_img