[–] Ulfghar 0 points 4 points (+4|-0) ago 

The security firm who found said flaw are just 3 dudes and a green screen looking for shekels

[–] aaronC 0 points 3 points (+3|-0) ago 

Even the disclaimer on the CTS site says they may be doing it for monetary reasons. Hyping or FUDing a product or commodity to affect prices is nothing new. You see it with cryptocurrency, gold, silver, etc. But this was just an extremely blatant, low effort attempt to briefly lowing AMD stock prices to short them. None of this is new, it's all happened before to other companies.

[–] ZYX321 0 points 0 points (+0|-0) ago 

Green screen is not unusual for interviews and releases. Most security research groups are just a few people anyway.

[–] PraiseIPU 0 points 4 points (+4|-0) ago 

This is starting to feel like intel propoganda.

Like "look amd is bad too! Please buy our chips. "

[–] TechInfo 0 points 2 points (+2|-0) ago 

Remember: It's such a critical flaw that we need you to replace or flash your BIOS first, and then give us your Administrative username and password. Please ALSO give us the PRIVATE KEY of a device-driver signing certificate so we can write a malicious (signed) device driver to implement the malicious code. See so easy! (/Sarcasm mode off).

Not remotely exploitable and this problem is out there regardless of what CPU you run. Trivial to safe guard against (disable BIOS modifications, keep your Admin password safe, implement due diligence when installing device drivers).

Oh yeah, these "security" guys are related to a hedge fund manager who placed a huge short position. Nothing to see here...