![]() I mention this because while this bug is big in the news, it’s probably not news the average consumer needs to concern themselves with.” “If you aren’t up to date, then there’s a lot of other nasties out there you should probably also be worrying about. “If you download the latest update from Microsoft, Apple, or Linux, then the problem is fixed for you and you don’t have to worry,” cyber security researcher Robert Graham wrote on his website, Errata Security. ![]() Spectre, researchers said, is harder to fix but is also harder to exploit. While it’s likely that your home computer or smartphone is affected by one or both of the vulnerabilities, there’s also a good chance it has been patched or a security update is available to help with Meltdown. Well, that depends on who you are and, in some cases, who your enemies are. This all sounds bad since the vulnerability is widespread and deep in the architecture of modern computing. The researchers who disclosed the vulnerabilities and the United Kingdom’s National Cyber Security Centre reportedly said they’re unaware of any hackers taking advantage of the exploits, but noted the attacks would be very difficult to spot if they had happened. (For more technical information on how Spectre and Meltdown work, the difference between the two and the responses from the various corporations involved, click here.) The idea is that if the guess is correct, the data will be more quickly accessible, and if it’s wrong, the data is thrown out - no harm, no foul.īut researchers said they found out that the little trick could be exploited by a hacker to expose system data that was never supposed to be read - potentially “sensitive information in the system’s memory such as passwords, encryption keys, or sensitive information open in applications,” according to Google’s security team. In short, security researchers say the vulnerabilities, dubbed Spectre and Meltdown, take advantage of a clever trick used by modern central processing units (CPUs) where the processing chip will continually “guess” the data it’s most likely to need to complete some operations and pre-load that information. ![]() The disclosure of serious security vulnerabilities in countless computer processing chips found inside everything from laptops to smart phones to cloud servers set the cyber security world ablaze last week and could change the way major manufacturers design their chips from here on out. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |