Spectre and Meltdown bug processor makers

Spectre and Meltdown bug processor makers”

While the security problem does have a solution, it involved hobbling the performance of the CPUs.

Independent security expert Graham Cluley told the Guardian that "Modern operating systems rely upon Intel's chips to provide some essential security services - but if a flaw has been found then the operating systems themselves will need to be updated to do the job that they believed Intel's chips were doing properly".

Meanwhile, the security flaw in Intel's chips makes it vulnerable to hacking.

Initial reports about this issue contained details on potential performance hits for systems due to the additional overhead that would be put in place to resolve this issue.

Meanwhile, a new statement by Intel, confirmed by 9to5Mac, reveals that not only Intel but the processors of ARM and AMD have also been affected by the bug.

In a statement, Intel said it was working with ARM and AMD to address the flaw.

"Intel has begun providing software and firmware updates to mitigate these exploits", the company has stated. However, the news from yesterday forced Intel to bring its announcement forward. The isolation of the kernel memory on the computer will create significant slowdowns of the processes and will impact the performance.

"Spectre" affects chips in smartphones and tablets, as well as computer chips from Intel and Advanced Micro Devices Inc.

A couple of days ago, Google along with other security researchers released a couple of documents which chronicled the major security flaws in Intel, AMD, and ARM processors. Although it's less dangerous now, it applies to a wider range of devices and could be a bit more difficult to fix.

While it's urging to see that Xbox is unaffected, different sorts of devices from PC to telephones, and web servers, still aren't completely checked. This means that AMD users are mostly safe compared to those who have Intel CPUs on their computers. The company's own list of affected CPUs extends much farther back than that, so it's possible that not all systems will see a fix. Meltdown flaw can be fixed by a patch which builds a stronger wall of protection around the kernel. Exploiting this flaw, hackers could potentially read computer memory to access passwords and other information.

Сomo este

Más reciente