How to Keep your device secure from Spectre and Meltdown bugs

How to Keep your device secure from Spectre and Meltdown bugs”

"For context, on newer CPUs such as on Skylake and beyond, Intel has refined the instructions used to disable branch speculation to be more specific to indirect branches, reducing the overall performance penalty of the Spectre mitigation".

Intel had announced the patches for Meltdown and Spectre hardware flaws however the exact number of devices affected remains unknown. Its newest chips were slowed down by 12 percent and one older type of chip, the Intel Core i7 6700K processor running on Windows 10, took a 21 percent hit in responsiveness. Microsoft is working on this issue since it came to notice and has already released a security update recently on Windows 10 and previous version of Windows.

"We previously said that we expected our performance impact should not be significant for average computer users, and the data we are sharing today support that expectation on these platforms", Navin Shenoy, an Intel senior vice president who heads its data center unit, said in a statement.

Spiceworks experts explained that businesses are fully aware of the risks but they either have no alternatives or no money for a software upgrade on their machines. The company said in a notice Tuesday on its website that it's working with AMD to resolve the problem so people can resume installing the recommended repairs. Some Ubuntu Xenial 16.04 users also report that the latest update for their OS has rendered their system unable to boot. In the post, Mark Papermaster, AMD's Chief Technology Officer, explains that Spectre variant 1 (Bounds Check Bypass or Spectre) applies to AMD processors, but it can be mitigated with an OS patch.

AMD was able to distance itself from Meltdown and Spectre at first because unlike Intel, its processors are not vulnerable to Meltdown. These issues apply to all modern processors and affect nearly all computing devices and operating systems.

Recent reports suggest that computers - personal, business, and cellular alike - are susceptible to two newly discovered major security flaws. The update includes security measures to guard against the Meltdown and Spectre attacks which came to light last week.

"We believe the performance impact of these updates is highly workload dependent", Krzanich said. If the prediction was wrong, this speculative execution is rolled back in a way that is intended to be invisible to software.

Сomo este

Más reciente