REMOTE SUPPORT

Download our Remote Support tool!

DOWNLOAD OUR SUPPORT TOOL

2 We'll provide you with a 9 digit ID number to enter.
3 Enter the code and we'll take control of your machine.

If you still have problems, please let us know, by sending an email to support@essystems.co.uk. Thank you!

WORKING HOURS

Monday to Friday
8:30am - 5:00pm

Protect your PC against the major ‘Meltdown’ CPU security flaw

by ES Systems Ltd / January 8, 2018, 2:09 pm / Published in ,
Intel CPU Flaw

Details have emerged on two major processor security flaws, and the industry is scrambling to issue fixes and secure machines for customers. Dubbed “Meltdown” and “Spectre,” the flaws affect nearly every device made in the past 20 years. The Meltdown flaw primarily affects Intel and ARM processors, and researchers have already released proof-of-concept code that could lead to attacks using Meltdown.

The vulnerabilities allow an attacker to compromise the privileged memory of a processor by exploiting the way processes run in parallel. They also allow an attacker to use JavaScript code running in a browser to access memory in the attacker’s process. That memory content could contain key strokes, passwords, and other valuable information. Researchers are already showing how easy this attack works on Linux machines, but Microsoft says it has “not received any information to indicate that these vulnerabilities have been used to attack customers at this time.”

Protecting a Windows PC is complicated right now, and there’s still a lot of unknowns. Microsoft, Google, and Mozilla are all issuing patches for their browsers as a first line of defense. Firefox 57 (the latest) includes a fix, as do the latest versions of Internet Explorer and Edge for Windows 10. Google says it will roll out a fix with Chrome 64, which is due to be released on January 23rd. Apple has not commented on how it plans to fix its Safari browser or even macOS. Chrome, Edge, and Firefox users on Windows won’t really need to do much apart from accept the automatic updates to ensure they’re protected at the basic browser level.

For Windows itself, this is where things get messy. Microsoft has issued an emergency security patch through Windows Update, but if you’re running third-party antivirus software then it’s possible you won’t see that patch yet. Security researchers are attempting to compile a list of antivirus software that’s supported, but it’s a bit of mess, to say the least.

Here’s a quick step-by-step checklist to follow for now:

  • Update to the latest version of Chrome (on January 23rd) or Firefox 57 if you use either browser
  • Check Windows Update and ensure KB4056892 is installed for Windows 10
  • Check your PC OEM website for support information and firmware updates and apply any immediately

These steps only currently provide protection against Meltdown, the more immediate threat of the CPU flaws. Spectre is still largely an unknown, and security researchers are advising that it’s more difficult to exploit than Meltdown.

Tagged under: ,

SIGN IN YOUR ACCOUNT TO HAVE ACCESS TO DIFFERENT FEATURES

CREATE ACCOUNT

FORGOT YOUR DETAILS?

TOP
%d bloggers like this: