Security Now with Steve Gibson and Leo Laporte

Nov 1st 2016

Security Now 584

Your Questions, Steve's Answers 242

Windows "Atom Bomb" exploit, side-channel attack on Intel processors, verifiable hacker-proof code.

Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
Category: Help & How To

Leo and Steve discuss an oh-so-subtle side-channel attack on Intel processors, the quest for verifiable hacker-proof code (which oh-so-subtle side-channel attacks on processors can exploit anyway!), another compiler optimization security gotcha, the challenge of adding new web features without opening routes of exploitation, some good news about the DMCA, Matthew Green and the DMCA, the relentless MPAA and RIAA still pushing the limits and threatening the Internet, the secure ProtonMail service feels the frightening power of skewed search results, regaining control over Windows 10 upgrade insistence, a new 0-day vulnerability Google revealed before Microsoft has patched it, a bit of errata, miscellany and as many listener feedback questions and comments as we have time for.

We invite you to read our show notes.

<p>Download or subscribe to this show at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now<… can submit a question to Security Now! at the <a href="http://grc.com/feedback.htm&quot; target="_blank">GRC Feedback Page</a>.</p><p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="http://grc.com/securitynow.htm&quot; target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="http://spinrite.info/&quot; target="_blank">Spinrite 6</a>.</p><p>Bandwidth for Security Now is provided by <a href="https://www.cachefly.com/&quot; target="_blank">CacheFly</a>.</p>