Feeds

Europe hit by re-marked Intel chips

Crooks nicked in Hong Kong

  • alert
  • submit to reddit

Internet Security Threat Report 2014

A report on NEWS.COM over the weekend suggests that the problem of re-marked CPUs in Europe this year was greater than earlier anticipated. Hong Kong local authorities seized more than £500,000 of re-marked Intel microprocessors last week. Crooks had re-marked more than 3,000 Pentium IIs to look like Pentium IIIs. The chips were intended for export to Europe. Pentium III CPUs from Intel have a unique identification number (personal serial number -- PSN) which identifies them as the real thing. And some Intel pages will not work unless the Pentium III identification number is switched on. Earlier this year, liberty groups were up-in-arms at the idea of the PSN, worried that individual users might be traced by the chip giant. But the number could be a protection against unscrupulous crooks re-marking Intel CPUs, it now emerges. ® RegisterFact015362583725395 Chipsets from the i810 (Whitney) onwards have a hardware random number generator as standard.

Choosing a cloud hosting partner with confidence

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.