Ian Cutress Talks AMDFlaws and Security on TechTeamGB Weekly Newsby Ian Cutress on March 16, 2018 9:00 AM EST
After our analysis about the vulnerability disclosures this week on AnandTech, and continuing discussions on Twitter, TechTeamGB, a Great Britain based Youtube technology channel, invited Senior Editor Ian Cutress on the Thursday show to discuss the recent news surrounding the AMDFlaws website, the ramifications of the announcement, the company behind the announcement, and what it means to the community at large.
Through the 96 minute discussion, Ian vocalised a lot of what has been covered on AnandTech already, and discussed some of the more esoteric claims in the wild that may or may not have elements of truth in them. This show was broadcast before posting our interesting call with CTS-Labs, the company behind the vulnerability disclosure, but has a number of snippets that are mirrored in that article.
A small Q&A from the TechTeamGB audience happens at the end of the show. The show is hosted by TechTeamGB Host, Andrew McDonald.
If you prefer your content in audio and video form, here it is.
Post Your CommentPlease log in or sign up to comment.
View All Comments
SaolDan - Friday, March 16, 2018 - linkSo thats what he looks like!!
Ian Cutress - Friday, March 16, 2018 - linkI would say I have my photo on Twitter, but it's now the bunny suit photo from the GloFo tour.
ಬುಲ್ವಿಂಕಲ್ ಜೆ ಮೂಸ್ - Friday, March 16, 2018 - link....and to our left is Nathan from Southpark
ಬುಲ್ವಿಂಕಲ್ ಜೆ ಮೂಸ್ - Friday, March 16, 2018 - linklookin Good Mimsyyy
You lose weight?
lashek37 - Friday, March 16, 2018 - linkThat’s what he look like🤷🏽♂️🌹❤️
Hurr Durr - Friday, March 16, 2018 - linkUm Yeah Um Um Yeah Um
Alexvrb - Friday, March 16, 2018 - linkForgot your meds again, I see.
Hurr Durr - Saturday, March 17, 2018 - linkMouthbreather triggered, good.
TesseractOrion - Sunday, March 18, 2018 - linkHurr Durr - the talking twat that just HAS to write something, ANYTHING (as long as it's pointless and retarded) in Anandtech's comments: as it's the only thing he has to do all day...
DrizztVD - Friday, March 16, 2018 - linkI have a tiny bit of experience in the computer security field. It usually irritated me how people would find ways to believe things that happen to help their pockets at the same time. You'd commonly hear a guy in the office saying something like: "I broke the system's security wiiiide open". Then, our red team guys, who would actually get paid to infiltrate a company right rough to the CEO's emails, would usually have a much more muted response. They know: only 1% of claimed "blow security right open" exploits actually end up suiting their needs. They run 1000s of exploits over more than a month to crack the system. Do you know what they do with the opened system then? They use it to build an internal employee/manager map so that they know who has the most valuable information in the company. Then, they will do a phishing attack on non-technical personal who have access to the end prize (CEO emails, or company account access, etc.) Any red team attack is 80% social engineering.