• Hype
  • Murai
  • Lipstiq
  • Varnam
  • Hangat
  • Autofreaks
Lowyat.NET
  • News
    • Lifestyle
    • Computing
    • Hardware
    • Internet
    • Rumours & Leaks
    • Software
  • Forums
    • Kopitiam
    • Tradezone
    • Property Talk
    • Finance & Business
    • Fast and Furious
  • Gaming
    • PC Gaming
    • Console
    • Esports
  • Mobile
    • Apps
    • OS
    • Tablets
    • Phones
    • Telco
      • Celcom
      • DiGi
      • Maxis
      • Tune Talk
      • U Mobile
      • Buzzme
  • Pricelists
    • Compu-zoneUpdated
    • ViewnetUpdated
    • Sri ComputersUpdated
    • StartecUpdated
  • More
    • Automotive Tech
    • Drone
    • Enterprise
    • Entertainment
    • Fashion
    • E-Hailing
    • Wearables
No Result
View All Result
Lowyat.NET
  • News
    • Lifestyle
    • Computing
    • Hardware
    • Internet
    • Rumours & Leaks
    • Software
  • Forums
    • Kopitiam
    • Tradezone
    • Property Talk
    • Finance & Business
    • Fast and Furious
  • Gaming
    • PC Gaming
    • Console
    • Esports
  • Mobile
    • Apps
    • OS
    • Tablets
    • Phones
    • Telco
      • Celcom
      • DiGi
      • Maxis
      • Tune Talk
      • U Mobile
      • Buzzme
  • Pricelists
    • Compu-zoneUpdated
    • ViewnetUpdated
    • Sri ComputersUpdated
    • StartecUpdated
  • More
    • Automotive Tech
    • Drone
    • Enterprise
    • Entertainment
    • Fashion
    • E-Hailing
    • Wearables
No Result
View All Result
Lowyat.NET
No Result
View All Result
Home Computing

Millions Of Intel-Based Laptops and Desktops Are At Risk: Here’s How To Verify Your System

by Chief Chapree
November 23, 2017
Share on WhatsappShare on TelegramThreads

Intel has recently revealed that quite a number of its processors are affected by security vulnerabilities. Originally discovered by external security researchers including Mark Ermolov and Maxim Goryachy of Positive Technologies Research, the issue is rather serious since these vulnerabilities could ultimately allow attackers to take over user’s system remotely.

Specifically, the issue might lead to unauthorized access to Intel Management Engine, Intel Server Platform Service, or Intel Trusted Execution Engines. All of these features are essential to the operation for most of Intel’s processors out there which is why the list of affected processors are quite extensive:

  • 6th, 7th, and 8th generation Intel Core Processor Family
  • Intel Xeon Processor E3-1200 v5 and v6 Product Family
  • Intel Xeon Processor Scalable Family
  • Intel Xeon Processor W Family
  • Intel Atom C3000 Processor Family
  • Apollo Lake Intel Atom Processor E3900 series
  • Apollo Lake Intel Pentium Processors
  • Intel Celeron N and J series Processors

With that, the security vulnerabilities have pretty much put millions of PCs out there at risk. If you are wondering whether your machine is affected by this vulnerability, Intel has actually released a downloadable tool that can help you verify the status of your PC:

Intel SA-00086 Detection ToolIf you are using Intel-based Mac PCs, you don’t have to worry about these vulnerabilities as they don’t affect your machines.

Meanwhile, various manufacturers are already working together with Intel to come out with fixes for their products. However, it might take some time for them to cover everyone given the long list of products that are affected by this issue.

RELATED:  Intel Core Ultra X7 And X9 Mobile Processors Officially Announced At CES 2026

(Source: Intel – 1, 2)

Filed Under intelintel atomintel celeronintel coreintel pentiumIntel Xeon
Updated 1:00 pm, Fri, 24 November 17
http://lowy.at/EAA74
SendShareShareShare2Tweet1

Follow us on Instagram, Facebook, Twitter or Telegram for more updates and breaking news. 

No Result
View All Result

TRENDING THIS WEEK

  1. 1
    News

    PM Announces Additional Hari Raya Aidilfitri Public Holiday, Subject To Syawal Date

  2. 2
    Transportation

    Rapid KL Announces Reduced Rail, Bus Frequencies On 20 – 23 March

  3. 3
    News

    Anwar: Intel’s Advanced Packaging Complex To Begin Operations This Year

  4. 4
    Cyber Security

    Security Alert: New “DarkSword” iOS 18 Exploit Targets iPhone Users In Malaysia

  5. 5
    5G Infrastructure

    iPhones May Finally Support 5G Standalone And 5G Advanced In Malaysia Via Upcoming Update

NETWORK

  • Hype
  • Murai
  • Lipstiq
  • Varnam
  • Hangat
  • Autofreaks

ABOUT

  • Advertise
  • Careers
  • Privacy Statement
  • Contact Us
  • Editorial Policy
  • Terms & Conditions

©2026 VIJANDREN RAMADASS. ALL RIGHTS RESERVED.

No Result
View All Result
  • News
    • Lifestyle
    • Computing
    • Hardware
    • Internet
    • Rumours & Leaks
    • Software
  • Forums
    • Kopitiam
    • Tradezone
    • Property Talk
    • Finance & Business
    • Fast and Furious
  • Gaming
    • PC Gaming
    • Console
    • Esports
  • Mobile
    • Apps
    • OS
    • Tablets
    • Phones
    • Telco
      • Celcom
      • DiGi
      • Maxis
      • Tune Talk
      • U Mobile
      • Buzzme
  • Pricelists
    • Compu-zone
    • Viewnet
    • Sri Computers
    • Startec
  • More
    • Automotive Tech
    • Drone
    • Enterprise
    • Entertainment
    • Fashion
    • E-Hailing
    • Wearables

©2026 VIJANDREN RAMADASS. ALL RIGHTS RESERVED.

No Result
View All Result
  • News
    • Lifestyle
    • Computing
    • Hardware
    • Internet
    • Rumours & Leaks
    • Software
  • Forums
    • Kopitiam
    • Tradezone
    • Property Talk
    • Finance & Business
    • Fast and Furious
  • Gaming
    • PC Gaming
    • Console
    • Esports
  • Mobile
    • Apps
    • OS
    • Tablets
    • Phones
    • Telco
      • Celcom
      • DiGi
      • Maxis
      • Tune Talk
      • U Mobile
      • Buzzme
  • Pricelists
    • Compu-zone
    • Viewnet
    • Sri Computers
    • Startec
  • More
    • Automotive Tech
    • Drone
    • Enterprise
    • Entertainment
    • Fashion
    • E-Hailing
    • Wearables

©2026 VIJANDREN RAMADASS. ALL RIGHTS RESERVED.