<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Meltdown Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/meltdown/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Thu, 21 Jun 2018 20:42:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>Microsoft Meltdown Patch Fatal Flaw – Work Ongoing</title>
		<link>https://www.osradar.com/microsoft-meltdown-patch-fatal-flaw-work-ongoing/</link>
					<comments>https://www.osradar.com/microsoft-meltdown-patch-fatal-flaw-work-ongoing/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Thu, 03 May 2018 07:49:53 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Meltdown]]></category>
		<category><![CDATA[meltdown patch]]></category>
		<category><![CDATA[windows patch]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=2861</guid>

					<description><![CDATA[<p>Meltdown and Spectre were the biggest inventions of the security flaws to date. They simply shook the world of cyber security to the roots. These are caused by hardware issues of the modern chipsets. Microsoft has released patches for these bugs, but the patches itself are in danger now. Recently, a serious vulnerability has been [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/microsoft-meltdown-patch-fatal-flaw-work-ongoing/">Microsoft Meltdown Patch Fatal Flaw – Work Ongoing</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Meltdown and Spectre were the biggest inventions of the security flaws to date. They simply shook the world of cyber security to the roots. These are caused by hardware issues of the modern chipsets. Microsoft has released patches for these bugs, but the patches itself are in danger now.</p>
<p>Recently, a serious vulnerability has been found in the Microsoft patch for Meltdown. For a quick reminder, meltdown removes the barrier of memory and allows access to other apps’ memory locations unauthorized. You can <a href="https://www.osradar.com/meltdown-spectre-computers-stake/">check out the original nature of Meltdown here</a>.</p>
<p>According to Alex Ionescu, a security researcher from cyber-security firm Crowdstrike, the patch allowed bypassing the security barrier and take the advantage of the chipset flaws for stealing information. Almost all the Microsoft Windows 10 versions are infected with the vulnerability, except the latest <a href="https://www.osradar.com/new-features-in-windows-10-v1803-spring-creators-update/">Windows 10 Redstone 4 (v1803).</a> It seems like Microsoft has fixed the vulnerability in the latest update.</p>
<p>Old Windows 10 systems are still running the bypass-able patch for Meltdown. Instead of backporting the update faster, Microsoft has released another new update for the Windows Host Computer Service Shim (hcsshim) library flaw (CVE-2018-8155) that allowed a hacker execute remote code in the vulnerable system. <a href="https://github.com/Microsoft/hcsshim/releases/tag/v0.6.10">The updated version of the “hcsshim” is available on GitHub</a>.</p>
<h3>How to Stay Secured</h3>
<p>If you’re a Windows 10 user, make sure to update to the latest version – v1803. Microsoft is already working with the backport updates. According to our assumption, the patch may arrive in May 2018 Patch Tuesday, but it’s just a speculation.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/microsoft-meltdown-patch-fatal-flaw-work-ongoing/">Microsoft Meltdown Patch Fatal Flaw – Work Ongoing</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/microsoft-meltdown-patch-fatal-flaw-work-ongoing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Meltdown and Spectre Exploits are Available!</title>
		<link>https://www.osradar.com/meltdown-and-spectre-exploits-available/</link>
					<comments>https://www.osradar.com/meltdown-and-spectre-exploits-available/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Fri, 16 Feb 2018 13:18:32 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Meltdown]]></category>
		<category><![CDATA[meltdown and spectre]]></category>
		<category><![CDATA[Spectre]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1927</guid>

					<description><![CDATA[<p>We all have heard about the Meltdown and Spectre – two serious bugs found in the systems of all the chips that would allow hackers to access unwanted information without any warning. Hackers already are trying to use these exploits. In theory, these bugs are hard to exploit. But presently, security researchers succeeded in creating [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/meltdown-and-spectre-exploits-available/">Meltdown and Spectre Exploits are Available!</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>We all have heard about the Meltdown and Spectre – two serious bugs found in the systems of all the chips that would allow hackers to access unwanted information without any warning. Hackers already are trying to use these exploits. In theory, these bugs are hard to exploit. But presently, security researchers succeeded in creating working exploits that use Meltdown and Spectre and able to steal info.</p>
<p>Security experts from Princeton University and NVIDIA have currently authored a new research paper that explains the “MeltdownPrime” and “SpectrePrime”. These exploits use the side-channel timing attacks to leverage the modern processor flaws. The attacks are able to extract data from the processor’s cache memory that might contain confidential info like passwords.</p>
<p>According to the report of the Register, the proof-of-concept exploit “SpectrePrime” has been successfully used on a MacBook with Intel Core i7 processor. However, the MeltdownPrime hasn’t been successful to demonstrate the capability of an actual hardware. Note that Meltdown massively infects Intel chips.</p>
<h3>The Risk</h3>
<p>Fortunately, we don’t have to panic just yet. For security reason, the codes used for creating the exploits haven’t been released, ensuring no imminent risk for the time being. However, the security experts developed exploits in the lab, meaning that the real criminals are already on the brink of creating such exploits. The current system patches are able to protect from Meltdown and Spectre like MeltdownPrime, SpectrePrime, and other potential exploits. We’re now waiting for Intel to release an official patch for these bugs.</p>
<p>According to security researchers, processor manufacturers might be facing extreme difficulty in making hardware changes to ensure immunity from these bugs. The flaws are so deeply integrated with the current silicon processors that covering the Meltdown and Spectre along with all the possible flaws might be extremely difficult.</p>
<h3>Flawless Processors</h3>
<p>The easiest and the most effective solution now is to change the hardware that can be costly for most. Intel announced that they’ll release Meltdown and Spectre free processors will arrive later this year. AMD also announced that their Meltdown and Spectre free processor (Zen 2 architecture) will arrive market in 2019. Until then, we have to stick with the software patches that has become a real mess all around the world. It’s also a matter to consider whether those will be really free from these bugs.</p>
<h3>Intel&#8217;s Bug Bounty</h3>
<p>In the meantime, Intel has increased the price of ‘bug bounty’ to get more help from the community on different flaws. The scheme is currently offering $250,000 for side-channel bugs/flaws like Meltdown and Spectre. The bounty for other channels has become around $100,000.</p>
<p>This program is available for everyone. That means that now, any security researcher may contribute to processors whereas previously, Intel only allowed invited researchers. This ensures that more people are hunting down the bug(s) and hopefully, find them out faster before the world knows them.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/meltdown-and-spectre-exploits-available/">Meltdown and Spectre Exploits are Available!</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/meltdown-and-spectre-exploits-available/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>KernelCare from CloudLinux – Promise to Fix Meltdown and Spectre without Reboot</title>
		<link>https://www.osradar.com/kernelcare-cloudlinux-promise-fix-meltdown-spectre-without-reboot/</link>
					<comments>https://www.osradar.com/kernelcare-cloudlinux-promise-fix-meltdown-spectre-without-reboot/#respond</comments>
		
		<dc:creator><![CDATA[Mel K]]></dc:creator>
		<pubDate>Mon, 12 Feb 2018 07:51:28 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CloudLinux]]></category>
		<category><![CDATA[kernelcare]]></category>
		<category><![CDATA[Meltdown]]></category>
		<category><![CDATA[meltdown and spectre]]></category>
		<category><![CDATA[Spectre]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1891</guid>

					<description><![CDATA[<p>CloudLinux is a great Linux security solution provider with awesome products and services. For enterprise level, CloudLinux is a highly dependable and reputed firm. KernelCare, their genius Linux kernel patching service allows installing kernel patches without rebooting the system. This system allows installing the Meltdown and Spectre patches without the system reboot. The Meltdown and [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/kernelcare-cloudlinux-promise-fix-meltdown-spectre-without-reboot/">KernelCare from CloudLinux – Promise to Fix Meltdown and Spectre without Reboot</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>CloudLinux is a great Linux security solution provider with awesome products and services. For enterprise level, CloudLinux is a highly dependable and reputed firm. KernelCare, their genius Linux kernel patching service allows installing kernel patches without rebooting the system. This system allows installing the Meltdown and Spectre patches without the system reboot.</p>
<p>The Meltdown and Spectre are the biggest security flaws till date. The core of the operating systems and flawed working method of modern CPUs allowed these bugs to be present for decades. They remained hidden until the end of 2017 when security researchers discovered them. The news shook the security platform, of course.</p>
<p>The very important thing is, Linux was the most vulnerable one of all. As Linux runs on the top level computers like servers, supercomputers etc. it’s important to keep them running for more productivity. However, when installing kernel patches, every device generally need to reboot to complete the action. With the help of KernelCare, it can complete without any reboot.</p>
<h3>The kernel patch</h3>
<p>Kernel patches can easily mitigate the vulnerability of a system to Meltdown and Spectre. The Meltdown can be disabled via the kernel, but Spectre is a difficult one. Yet, kernel patches will make them harder to exploit for hackers, a temporary solution. When installing them, the device must reboot to complete the process. Sure, it’s not big of an issue for general users like us. But when it’s a server or supercomputer we’re talking about huge business – any slight disturbance might cause unexpected situations.</p>
<h3>KernelCare features</h3>
<p><img loading="lazy" class="size-full wp-image-1893 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/02/kernelcare-no-reboot.png" alt="" width="858" height="467" srcset="https://www.osradar.com/wp-content/uploads/2018/02/kernelcare-no-reboot.png 858w, https://www.osradar.com/wp-content/uploads/2018/02/kernelcare-no-reboot-300x163.png 300w, https://www.osradar.com/wp-content/uploads/2018/02/kernelcare-no-reboot-768x418.png 768w, https://www.osradar.com/wp-content/uploads/2018/02/kernelcare-no-reboot-696x379.png 696w, https://www.osradar.com/wp-content/uploads/2018/02/kernelcare-no-reboot-772x420.png 772w" sizes="(max-width: 858px) 100vw, 858px" /></p>
<p>That’s where KernelCare comes in handy. According to CloudLinux, KernelCare is now capable of applying the Meltdown and Spectre patches for RHEL 7, CentOS 7 &amp; 7+, Promox Virtual Environment 3.10 and CloudLinxu 7 series OS.</p>
<p>For using the service of KernelCare, the subscription charge is $2.25 per server per month. If you have any doubt about the product, you can also take a trial for 30 days. Moreover, CloudLinux also promises to bring support for more GNU/Linux distributions very soon. The list includes Ubuntu, Debian, CloudLinux 6, RHEL 6, Virtuozzo 6 series and CentOS 6. However, a fact CloudLinux covered is Xen PV &#8211; they won&#8217;t support it. Xen PV is widely used by enterprises and cloud providers.</p>
<p>Ubuntu LTS series seeming comes up with a similar service like KernelCare, but that patching service (Canonical Livepatch Service) isn’t able of live patching the Meltdown and Spectre vulnerabilities. So, until the Canonical Livepatch Service comes up with the Meltdown and Spectre patches, you can go with KernelCare for your business. Take a look at KernelCare.</p>
<p>If you’re not interested in KernelCare, you can also use tools that will identify any attempt of exploiting Meltdown. The tool will cover Spectre in the future. The tool is available for Linux. <a href="https://www.osradar.com/meltdown-defense-linux-tool-sentinelone/">Check out the Linux tool</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/kernelcare-cloudlinux-promise-fix-meltdown-spectre-without-reboot/">KernelCare from CloudLinux – Promise to Fix Meltdown and Spectre without Reboot</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/kernelcare-cloudlinux-promise-fix-meltdown-spectre-without-reboot/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Windows Update to Kill Spectre Patch</title>
		<link>https://www.osradar.com/windows-update-kill-spectre-patch/</link>
					<comments>https://www.osradar.com/windows-update-kill-spectre-patch/#respond</comments>
		
		<dc:creator><![CDATA[Mel K]]></dc:creator>
		<pubDate>Tue, 30 Jan 2018 16:22:18 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Meltdown]]></category>
		<category><![CDATA[meltdown and spectre]]></category>
		<category><![CDATA[Spectre]]></category>
		<category><![CDATA[spectre and meltdown]]></category>
		<category><![CDATA[windows update]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1654</guid>

					<description><![CDATA[<p>The Meltdown and Spectre – the biggest and massive flaw discovered in the core design of modern CPUs starting from 1995. These flaws were present there for decades until we discovered what they are. Thanks to the security research teams, the whole world is in a danger of security threats. As they’re publicly disclosed, both [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/windows-update-kill-spectre-patch/">Windows Update to Kill Spectre Patch</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Meltdown and Spectre – the biggest and massive flaw discovered in the core design of modern CPUs starting from 1995. These flaws were present there for decades until we discovered what they are. Thanks to the security research teams, the whole world is in a danger of security threats. As they’re publicly disclosed, both the users and hackers know about them. Rest assured, hackers are working heart and soul to use them to their advantages.</p>
<h3>The Spectre patch</h3>
<p>The Meltdown was relatively easy to resolve using software patches. A few kernel tweaks and changes are enough to mitigate exploitation of the Meltdown. The kernel is the core software of any OS. It works in-between the hardware and software. However, the Spectre is a harder one.</p>
<p>Microsoft has published a Windows update for disabling microcode patches released earlier for the Spectre variant 2 – Branch Target Injection (CVE-2017-5715) vulnerability. Microsoft released this counter patch after a week Intel asked customers and OEMs to stop deploying the buggy security patches. According to Intel, those patches might introduce more reboots than expected and unpredictable system behavior.</p>
<h3>The reason</h3>
<p>Why is Microsoft disabling the patch? The answer from Microsoft was quite logical. Unstable systems will eventually cause data loss or corruption. Think of a scenario like this: you’re working hard on your next day assignment or in the middle of an ongoing project, then your system reboots out of nowhere (unexpected reboots). This is more annoying than Spectre, I believe.</p>
<p>However, you don’t need to worry about the Meltdown and Spectre right now. These security flaws are, by their nature, is very hard to pull off. The Meltdown is relatively easier to pull off compared to Spectre. The Spectre requires a deeper knowledge of the victim’s programs’ inner workings. As you guessed, not every hacker is that much good. Moreover, there has been no report of using Spectre variant 2 (CVE-2017-5715) to exploit a system.</p>
<h3>What to do</h3>
<p>Windows will automatically download and install the update via Windows Update. The update is also available to download from the <a href="https://www.catalog.update.microsoft.com/ScopedViewInline.aspx?updateid=20ff3247-bd92-4683-9094-c298e9c6125f">Microsoft Catalog</a>. The update ID is KB4078130 and size is 24KB. For advanced users, Microsoft also describes a method to disable the Spectre variant 2 patch using Windows Registry. Two guides are available – for <a href="https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in">desktops</a> and <a href="https://support.microsoft.com/en-us/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution">servers</a>.</p>
<p><img loading="lazy" class="size-full wp-image-1656 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/01/microsoft-update-catalog.png" alt="" width="1365" height="343" srcset="https://www.osradar.com/wp-content/uploads/2018/01/microsoft-update-catalog.png 1365w, https://www.osradar.com/wp-content/uploads/2018/01/microsoft-update-catalog-300x75.png 300w, https://www.osradar.com/wp-content/uploads/2018/01/microsoft-update-catalog-768x193.png 768w, https://www.osradar.com/wp-content/uploads/2018/01/microsoft-update-catalog-1024x257.png 1024w, https://www.osradar.com/wp-content/uploads/2018/01/microsoft-update-catalog-696x175.png 696w, https://www.osradar.com/wp-content/uploads/2018/01/microsoft-update-catalog-1068x268.png 1068w" sizes="(max-width: 1365px) 100vw, 1365px" /></p>
<p>It’s mostly Intel to blame for the issues. Intel has earned a really bad reputation in the press and the community for their inability to provide necessary &amp; flawless security fix for the speculative execution bugs. Speculative execution is such a blazing technique that boosts the performance far ahead. However, Intel’s CEO Brian Krzanich said that we may see new Intel processors free of these bugs within 2018. If you’re interested in learning more about the Meltdown and Spectre bug, check out the <a href="https://www.osradar.com/meltdown-spectre-computers-stake/">complete details</a>.</p>
<p>If you’re a Windows user, you already know how much time + bandwidth consuming process is Windows Update. Using a 3<sup>rd</sup>-party tool, you can cut this short several times! Check out <a href="https://www.osradar.com/how-to-update-windows-offline/">how to use WSUS Offline Update</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/windows-update-kill-spectre-patch/">Windows Update to Kill Spectre Patch</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/windows-update-kill-spectre-patch/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fake Meltdown and Spectre Patch – Beware of Malware</title>
		<link>https://www.osradar.com/fake-meltdown-spectre-patch-beware-malware/</link>
					<comments>https://www.osradar.com/fake-meltdown-spectre-patch-beware-malware/#respond</comments>
		
		<dc:creator><![CDATA[Mel K]]></dc:creator>
		<pubDate>Tue, 30 Jan 2018 10:46:37 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[fake meltdown patch]]></category>
		<category><![CDATA[fake patch]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Meltdown]]></category>
		<category><![CDATA[smoke loader]]></category>
		<category><![CDATA[Spectre]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1648</guid>

					<description><![CDATA[<p>The Meltdown and Spectre are, by far, the biggest security flaw ever discovered. It challenged how we perceive our hardware and software in the field of security. These 2 bugs affect almost all the processors – Intel, AMD, ARM etc. all. Different systems are affected differently, but all of them require proper patches. Researchers and [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/fake-meltdown-spectre-patch-beware-malware/">Fake Meltdown and Spectre Patch – Beware of Malware</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Meltdown and Spectre are, by far, the biggest security flaw ever discovered. It challenged how we perceive our hardware and software in the field of security. These 2 bugs affect almost all the processors – Intel, AMD, ARM etc. all. Different systems are affected differently, but all of them require proper patches. Researchers and developers are working hard to provide the best software solution, as hardware solution requires processor replacement, a very costly process that not everyone can pursue. A security patch is the best solution for now.</p>
<p>Hackers are never falling behind the trend of the present. They’re also trying hard to use these flaws to exploit systems. In this series of attempts, they’re now releasing fake update packages in the name of system patches. That package contains a heinous malware to take over your system.</p>
<h3>Smoke Loader</h3>
<p>Malwarebytes spotted that fake package. The firm has also identified a new domain that contains a whole bunch of info on how Meltdown and Spectre affect CPUs. Apparently, the website also contains some content from the German Federal Office for Information Security (BSI). The fake package is a ZIP archive link. The file name was “Intel-AMD-SecurityPatch-10-1-v1.exe”.</p>
<h3>How it works</h3>
<p>A victim trying to download and deploy the file installs Smoke Loader malware without any knowledge. Moreover, the installed malware downloads several more payloads by connecting to various domains and start sending encrypted data to servers. The website was also sending fake phishing emails. Here’s a screenshot of the website.</p>
<p><img loading="lazy" class="alignnone size-full wp-image-1649" src="https://www.osradar.com/wp-content/uploads/2018/01/fake-meltdown-spectre-patch-website.png" alt="" width="1061" height="777" srcset="https://www.osradar.com/wp-content/uploads/2018/01/fake-meltdown-spectre-patch-website.png 1061w, https://www.osradar.com/wp-content/uploads/2018/01/fake-meltdown-spectre-patch-website-300x220.png 300w, https://www.osradar.com/wp-content/uploads/2018/01/fake-meltdown-spectre-patch-website-768x562.png 768w, https://www.osradar.com/wp-content/uploads/2018/01/fake-meltdown-spectre-patch-website-1024x750.png 1024w, https://www.osradar.com/wp-content/uploads/2018/01/fake-meltdown-spectre-patch-website-80x60.png 80w, https://www.osradar.com/wp-content/uploads/2018/01/fake-meltdown-spectre-patch-website-696x510.png 696w, https://www.osradar.com/wp-content/uploads/2018/01/fake-meltdown-spectre-patch-website-574x420.png 574w" sizes="(max-width: 1061px) 100vw, 1061px" /></p>
<p>Here is the file that contains the malware. Note that Smoke Loader is capable of loading other bunches of malware additionally to wreak havoc on your system.</p>
<p><img loading="lazy" class="alignnone size-full wp-image-1650" src="https://www.osradar.com/wp-content/uploads/2018/01/smoke-loader-fake-security-patch.png" alt="" width="772" height="583" srcset="https://www.osradar.com/wp-content/uploads/2018/01/smoke-loader-fake-security-patch.png 772w, https://www.osradar.com/wp-content/uploads/2018/01/smoke-loader-fake-security-patch-300x227.png 300w, https://www.osradar.com/wp-content/uploads/2018/01/smoke-loader-fake-security-patch-768x580.png 768w, https://www.osradar.com/wp-content/uploads/2018/01/smoke-loader-fake-security-patch-80x60.png 80w, https://www.osradar.com/wp-content/uploads/2018/01/smoke-loader-fake-security-patch-696x526.png 696w, https://www.osradar.com/wp-content/uploads/2018/01/smoke-loader-fake-security-patch-556x420.png 556w" sizes="(max-width: 772px) 100vw, 772px" /></p>
<p>The identifier of the malware, Malwarebytes already contacted with CloudFlare and Comodo on such abuse. Even if this attack is diminished, hackers are already on the edge of inventing other methods.</p>
<h3>How to stay protected</h3>
<p>To stay protected, it’s always necessary to stay vigilant and aware of such spoofing. You need to use the best antivirus or internet security software to prevent any malware injection into your system. You’re also recommended to take a look at the <a href="https://www.osradar.com/best-antivirus-software-2018/">top antivirus software 2018</a>.</p>
<p>Because of the Meltdown and Spectre, Linux is the most vulnerable to these attacks. Linux is the most used OS in the top level of cyber world – supercomputers, servers etc. all run on it. Fortunately, there’s a tool that will take care of any Meltdown attack, allowing system admins not to install the buggy Meltdown patch that slowed down the system. <a href="https://www.osradar.com/meltdown-defense-linux-tool-sentinelone/">Learn more about the tool</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/fake-meltdown-spectre-patch-beware-malware/">Fake Meltdown and Spectre Patch – Beware of Malware</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/fake-meltdown-spectre-patch-beware-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Meltdown Defense – Linux Tool by SentinelOne</title>
		<link>https://www.osradar.com/meltdown-defense-linux-tool-sentinelone/</link>
					<comments>https://www.osradar.com/meltdown-defense-linux-tool-sentinelone/#respond</comments>
		
		<dc:creator><![CDATA[Mel K]]></dc:creator>
		<pubDate>Mon, 29 Jan 2018 07:07:23 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Linux Security]]></category>
		<category><![CDATA[Meltdown]]></category>
		<category><![CDATA[meltdown and spectre]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1630</guid>

					<description><![CDATA[<p>The Meltdown and Spectre have been the topic of security for a while. The reason is the category of these vulnerabilities – hardware issues. Can you imagine that almost all the processors since 1995 are affected? For getting rid of all them, the best solution is to change hardware – a very costly solution that [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/meltdown-defense-linux-tool-sentinelone/">The Meltdown Defense – Linux Tool by SentinelOne</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Meltdown and Spectre have been the topic of security for a while. The reason is the category of these vulnerabilities – hardware issues. Can you imagine that almost all the processors since 1995 are affected? For getting rid of all them, the best solution is to change hardware – a very costly solution that a lot can’t afford. We’re having software patches to mitigate the damage possibility. Fortunately, SentinelOne has released a free tool for Linux that allows system admins to prevent Meltdown attacks before they take root.</p>
<p>The new tool developed by SentinelOne is named Blacksmith. It’s a free tool for everyone. <a href="https://www.sentinelone.com/blog/sentinelone-releases-free-linux-tool-detect-meltdown-vulnerability-exploitations/">Get Blacksmith from SentinelOne</a>. However, Blacksmith tool isn’t open-source. SentinelOne decided to save time by expediting its development in-house, according to Raj Rajamani, vice president of project management at SentinelOne. He also informed that the tool is free for everyone in hope of securing Linux systems while devs create reliable system patches.</p>
<h3>Why use Blacksmith</h3>
<p>At the end of 2017, security researchers identified the horrible &amp; terrible bug in most of the modern processors. All these processors used a method called “speculative execution” that allowed these 2 heinous bugs to be possible. Intel, AMD, and ARM – all are affected by them, mostly Intel. The Meltdown flaw is a design flaw of all the Intel chips. The flaw was in the kernel that controlled the chip performance. It’s possible to defend using software patches. However, the Spectre is a lot more difficult to defend against. Learn more about <a href="https://www.osradar.com/meltdown-spectre-computers-stake/">the Meltdown and Spectre</a>.</p>
<p>With the help of SentinelOne’s Blacksmith, Linux users now will be defending Meltdown attacks successfully. The company is working on a similar tool for defense against Spectre as well.</p>
<p>The tool works beyond all the other tools offer today. Some tools only tell you whether you’re exposed or not. Security researcher Dor Danker at SentinelOne used behavioral detection methods to develop Blacksmith that’s capable of catching any Meltdown exploit &amp; attempts. Danker and his fellow researchers took several weeks to prepare the tool. The process required gathering data from industry partners, chip makers, and Microsoft.</p>
<h3>Why on Linux</h3>
<p>The reason this tool is made for Linux is pretty obvious. First of all, Linux is more susceptible to Meltdown attacks with no extensive available solution. An important note, the top computers – servers, supercomputers etc. all use Linux as their OS. These 2 reasons are very lucrative for hackers to target Linux as an easy, valuable hunt.</p>
<p>According to Migo Kedem, SentinelOne’s director of product management said that the reasons make it clear why Linux needs effective protection as quickly as possible.</p>
<p>The currently available patches slow down the system. It’s not so much visible for home users. However, the influence is huge when we talk about enterprises. It’s the main reason why IT organizations may decide to resist the patches or wait for further patches. That’s where this tool will be really handy without any performance changes.</p>
<h3>How Blacksmith works</h3>
<p>The tool influences the feature of performance counting on modern chipsets. Using this method, Blacksmith can monitor malicious caching behavior. According to Danker, the Meltdown creates different patterns during exploitation.</p>
<p>Here&#8217;s the official demonstration of Blacksmith.</p>
<div style="width: 696px;" class="wp-video"><!--[if lt IE 9]><script>document.createElement('video');</script><![endif]-->
<video class="wp-video-shortcode" id="video-1630-1" width="696" height="392" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.osradar.com/wp-content/uploads/2018/01/SentinelOne-Releases-Free-Linux-Tool-to-Detect-Meltdown-Vulnerability-Exploitations.mp4?_=1" /><a href="https://www.osradar.com/wp-content/uploads/2018/01/SentinelOne-Releases-Free-Linux-Tool-to-Detect-Meltdown-Vulnerability-Exploitations.mp4">https://www.osradar.com/wp-content/uploads/2018/01/SentinelOne-Releases-Free-Linux-Tool-to-Detect-Meltdown-Vulnerability-Exploitations.mp4</a></video></div>
<p>On modern chipsets, Blacksmith uses the built-in Linux mechanism “perf evennts”. It collects info about running processes. Kedem said that in case of virtual environments and older processors, Blacksmith looks for a specific type of page fault, indicating Meltdown exploitation attempts.</p>
<p>When the tool identifies any attempt, Blacksmith reports to “Syslog” locally. If the “Syslog” is on a remote server, Blacksmith sends the report via email. Checking on that, system admins can take necessary measures to clean up the exploitation.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/meltdown-defense-linux-tool-sentinelone/">The Meltdown Defense – Linux Tool by SentinelOne</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/meltdown-defense-linux-tool-sentinelone/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://www.osradar.com/wp-content/uploads/2018/01/SentinelOne-Releases-Free-Linux-Tool-to-Detect-Meltdown-Vulnerability-Exploitations.mp4" length="20533554" type="video/mp4" />

			</item>
		<item>
		<title>Automated Tool from Linux Lite Devs – Check for Meltdown and Spectre</title>
		<link>https://www.osradar.com/automated-tool-from-linux-lite-devs-check-for-meltdown-and-spectre/</link>
					<comments>https://www.osradar.com/automated-tool-from-linux-lite-devs-check-for-meltdown-and-spectre/#comments</comments>
		
		<dc:creator><![CDATA[Mel K]]></dc:creator>
		<pubDate>Thu, 25 Jan 2018 06:25:45 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[linux tool]]></category>
		<category><![CDATA[Meltdown]]></category>
		<category><![CDATA[meltdown and spectre]]></category>
		<category><![CDATA[Spectre]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1539</guid>

					<description><![CDATA[<p>In the recent days, the Meltdown and Spectre have been a really hot topic. Major system flaw in almost all the modern processors, in theory, can allow a hacker to compromise any system, regardless of security measures. Most importantly, antivirus or protection software isn’t able to block them. Now, for Linux users, a new checker [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/automated-tool-from-linux-lite-devs-check-for-meltdown-and-spectre/">Automated Tool from Linux Lite Devs – Check for Meltdown and Spectre</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In the recent days, the Meltdown and Spectre have been a really hot topic. Major system flaw in almost all the modern processors, in theory, can allow a hacker to compromise any system, regardless of security measures. Most importantly, antivirus or protection software isn’t able to block them. Now, for Linux users, a new checker tool is available to check out the scope of Meltdown and Spectre.</p>
<p>If you don’t know how Meltdown and Spectre works, here’s a summary. Every modern processor uses a method called “speculative execution”. This method makes the processor function blazingly faster. Using the method, a hacker can execute such a program that can disclose sensitive info from other apps. Learn in-depth about the Meltdown and Spectre bug <a href="https://www.osradar.com/meltdown-spectre-computers-stake/">here</a>.</p>
<p>For Windows users, there’s a tool called InSpectre. This tool will analyze your system and tell if you’re vulnerable to these bugs. <a href="https://www.grc.com/inspectre.htm">Get InSpectre</a>. However, for Linux users, this type of tool wasn’t available. Thankfully, Linux Lite developers created such a tool for every Linux distro. Linux Lite is a Linux distro based on Ubuntu.</p>
<h3>How to use</h3>
<p>The tool is very simple to use. It’s a CLI tool, so please be focused.</p>
<ul>
<li><a href="https://github.com/linuxlite/Spectre-Meltdown-Checker-Automated/archive/master.zip">Download the Spectre Meltdown Checker Automated from GitHub</a>.</li>
<li>Extract the ZIP archive in a folder.</li>
<li>Open a terminal in that directory and run the following command:</li>
<li>Double-click on “sm-start” or run the following command:</li>
</ul>
<pre class="lang:default decode:true ">chmod +x sm-*</pre>
<p>If you&#8217;re using XFCE with Thunar, use the following command:</p>
<pre class="lang:default decode:true">xfconf-query --channel thunar --property /misc-exec-shell-scripts-by-default --create --type bool --set true</pre>
<p>It’ll show an output like in the GIF shown below.</p>
<p><img loading="lazy" class="alignnone size-full wp-image-1540" src="https://www.osradar.com/wp-content/uploads/2018/01/spectre-meltdown-check-result.gif" alt="" width="1412" height="836" /></p>
<p>&nbsp;</p>
<p>If this tool seems a bit difficult, there’s another similar tool. It’s a very simple, plain shell script to check out for the vulnerabilities. <a href="https://github.com/speed47/spectre-meltdown-checker">Get the script Spectre &amp; Meltdown Checker</a>. When you run the script, you can see the following result. It’s a sample one.</p>
<p><img loading="lazy" class="alignnone wp-image-1541" src="https://www.osradar.com/wp-content/uploads/2018/01/meltdown-and-spectre-check-result-300x135.png" alt="" width="733" height="330" srcset="https://www.osradar.com/wp-content/uploads/2018/01/meltdown-and-spectre-check-result-300x135.png 300w, https://www.osradar.com/wp-content/uploads/2018/01/meltdown-and-spectre-check-result-768x346.png 768w, https://www.osradar.com/wp-content/uploads/2018/01/meltdown-and-spectre-check-result-1024x461.png 1024w, https://www.osradar.com/wp-content/uploads/2018/01/meltdown-and-spectre-check-result-696x313.png 696w, https://www.osradar.com/wp-content/uploads/2018/01/meltdown-and-spectre-check-result-1068x481.png 1068w, https://www.osradar.com/wp-content/uploads/2018/01/meltdown-and-spectre-check-result-933x420.png 933w, https://www.osradar.com/wp-content/uploads/2018/01/meltdown-and-spectre-check-result.png 1180w" sizes="(max-width: 733px) 100vw, 733px" /></p>
<h3>What to do now</h3>
<p>After running this tool, you’ll know whether you’re vulnerable to any of the flaws. If you’re not, congratulations! In case your system is vulnerable, you need to think about it.</p>
<p>Whatever your system’s status is, it’s the best to run a system update. Different Linux distros follow different rules to manage and update the system. Here’s a detailed <a href="https://www.linux.com/learn/linux-101-updating-your-system">guide to update &amp; upgrade your Linux</a>.</p>
<p>Here’s a caution – don’t install Intel’s latest microcode. Different specialists are criticizing the buggy and troublesome patch from Intel. Many computers simply started reboot unexpectedly along with some other issues. So, for now, it’s the best to stay out of that microcode update.</p>
<p>For Linux users, Linux Lite can make a big change to your perspective and a refreshing desktop. It’s based on Ubuntu, the most popular Linux distro ever. It’s mostly focused on simplicity and faster performance. <a href="https://www.linuxliteos.com/">Check out Linux Lite today</a>!</p>
<p>Have you checked your system? If not, do it now. The Meltdown and Spectre is a result of faulty processors, mostly Intel processors. These flaws can’t be removed completely without hardware replacement. However, using software upgrades, we can mitigate the danger.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/automated-tool-from-linux-lite-devs-check-for-meltdown-and-spectre/">Automated Tool from Linux Lite Devs – Check for Meltdown and Spectre</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/automated-tool-from-linux-lite-devs-check-for-meltdown-and-spectre/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>More Meltdown and Spectre Flaws Incoming!</title>
		<link>https://www.osradar.com/more-spectre-like-flaws-might-happen-again/</link>
					<comments>https://www.osradar.com/more-spectre-like-flaws-might-happen-again/#respond</comments>
		
		<dc:creator><![CDATA[Mel K]]></dc:creator>
		<pubDate>Thu, 18 Jan 2018 06:12:35 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Meltdown]]></category>
		<category><![CDATA[meltdown and spectre]]></category>
		<category><![CDATA[Spectre]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1420</guid>

					<description><![CDATA[<p>After the Meltdown and Spectre, a huge security shock hit the world. Almost all the modern processors are vulnerable to these flaws. The Meltdown affects mostly all the Intel processors, whereas the Spectre affects all processors including ARM, AMD, and Intel. Every manufacturer is working on the bug and released several patches to fix the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/more-spectre-like-flaws-might-happen-again/">More Meltdown and Spectre Flaws Incoming!</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>After the Meltdown and Spectre, a huge security shock hit the world. Almost all the modern processors are vulnerable to these flaws. The Meltdown affects mostly all the Intel processors, whereas the Spectre affects all processors including ARM, AMD, and Intel. Every manufacturer is working on the bug and released several patches to fix the issues. According to Arm Holdings CEO Simon Segars, we might even find out more bugs in the systems that seem to be safe at present.</p>
<p>Using the Meltdown and Spectre flaws, a hacker could theoretically pull out sensitive info out of the system. As we know how these bugs work, we can fix them despite the cost. However, Simon Segars tells us that more flaws are yet to be found out in the systems. In an interview at CES 2018, he said, “The reality is there are probably other things out there like it that have been deemed safe for years. Somebody whose mind is sufficiently warped toward thinking about security threats may find other ways to exploit systems which had otherwise been considered completely safe.”</p>
<h3>The cause of Meltdown and Spectre</h3>
<p>The reason why Meltdown and Spectre grew up is the speculative execution. It’s a hardware technique that allows a processor to perform significantly faster. If we are to avoid the exploits, we have to get rid of the “speculative execution”. This is way too much to give up. Segars said that the speed boost is too significant to remove it from advanced chipsets.</p>
<h3>Cybersecurity</h3>
<p>Simon Segars also puts force on cybersecurity, “cybersecurity is a mess”. Cyberspace needs 100% security as AI and IoT are getting more and more traction in the cyber world. Flaws like Meltdown and Spectre will simply put everything at a great risk in these scenarios.</p>
<p>“It really is mind-bending what people have done to exploit this side effect”, Simon Segars said. “Nobody thought of it before. Like all discoveries, they&#8217;re only obvious after the point they&#8217;re discovered.” It’s true that companies are adopting speculative execution for years, and none thought about the potential of vulnerability. According to Segars, “But what you&#8217;ll see is [that] the end system is a combination of software and hardware. How it&#8217;s written and tested &#8212; all of that will evolve to make sure the risks of using that approach are well understood.”</p>
<p>ARM hasn’t decided to change their processor’s architecture or software yet for preventing any future security risks. Segars ensured that ARM will continue examining similar potential vulnerabilities while making processor tweaks.</p>
<p>Why didn’t ARM find the flaw itself? Segars answered, “What this demonstrates is that the world of security is a moving target. Just when you think you&#8217;ve got things under control, something else comes along.” The same statement is true for all other processor manufacturers.</p>
<h3>Check your system with InSpectre</h3>
<p>Is your system vulnerable to Meltdown and Spectre? You can now check using InSpectre tool. It’s a very small (&lt;1MB) tool for Windows PCs to check out your system’s status. <a href="https://www.grc.com/inspectre.htm">Get InSpectre</a>.</p>
<p>All we can do now is stay alert for any malware and keeping all our software and OS up-to-date. Until the systems are bug-free for good, we have to wait a long time (maybe years).</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/more-spectre-like-flaws-might-happen-again/">More Meltdown and Spectre Flaws Incoming!</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/more-spectre-like-flaws-might-happen-again/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Meltdown and Spectre – All Computers at Stake</title>
		<link>https://www.osradar.com/meltdown-spectre-computers-stake/</link>
					<comments>https://www.osradar.com/meltdown-spectre-computers-stake/#respond</comments>
		
		<dc:creator><![CDATA[Mel K]]></dc:creator>
		<pubDate>Sun, 07 Jan 2018 10:29:17 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[intel cpu bug]]></category>
		<category><![CDATA[Meltdown]]></category>
		<category><![CDATA[meltdown and spectre]]></category>
		<category><![CDATA[Spectre]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1080</guid>

					<description><![CDATA[<p>When it comes about electronic devices, security is the top priority here. However, with recent researches ongoing, we’re getting to know only that how vulnerable we are in the cyber world. A pair of a serious exploit, the Meltdown and Spectre in the most modern processors is discovered in the first week of January 2018. [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/meltdown-spectre-computers-stake/">The Meltdown and Spectre – All Computers at Stake</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>When it comes about electronic devices, security is the top priority here. However, with recent researches ongoing, we’re getting to know only that how vulnerable we are in the cyber world. A pair of a serious exploit, the Meltdown and Spectre in the most modern processors is discovered in the first week of January 2018. These two new vulnerabilities are known as the Meltdown and the Spectre exploit.</p>
<p>The Meltdown exploit was discovered by three teams – a team at Cyberus Technology, Jann Horn at Google Project Zero and a team at the Graz University of Technology. They discovered and reported the flaw independently.</p>
<p>The Spectre exploit was discovered by a team led by Paul Kocher along with representatives from the University of Pennsylvania, University of Adelaide, Data61, University of Maryland and Rambus. The flaw was identified and reported independently.</p>
<p>Why are these threats so dangerous? They allow a hacker to simply use the hardware resource to steal information while leaving no trace in the traditional log file! Even traditional antivirus software is unlikely to detect illegal access to programs using the exploit.</p>
<h2><strong>Why these bugs are serious</strong></h2>
<p>Unlike other heinous bugs found previously, these two bugs are more serious to date. The truth is, these bugs not only affects desktops &amp; laptops but also virtually all the company’s processors produced since 1995 with a few exception.</p>
<p>Both of these bugs allow unauthorized access to the processing data. Generally, a program isn’t allowed to read other apps’ data and is ensured by the hardware. Unfortunately, these bugs allow such action to perform.</p>
<h2><strong>How the Meltdown and Spectre work</strong></h2>
<p><strong>Meltdown</strong>: This one mainly affects most of the Intel processors. This bug works by breaking the barrier that prevents apps from getting access to arbitrary locations in the kernel memory. The kernel segregates and protects memory for every single process and keeps a barrier so that one can’t interfere with another’s data. However, the meltdown bug now makes this serious procedure unreliable. This flaw mostly makes desktops &amp; laptops vulnerable.</p>
<p>This flaw even allows anyone in the cloud to retrieve the data without any permission and privilege. Virtually, this affects every user of a personal computer. Intel’s “speculative execution” method used in the processors doesn’t fully segregate processes by low-privilege and high-privilege that are meant to be in the computer’s kernel memory.</p>
<p><strong>Spectre</strong>: Intel, AMD and ARM processors are affected by this bug. The working method is different than meltdown bug, however. This flaw tricks applications into disclosing the secured data inside their protected memory area. This exploit is harder to pull off. However, this bug affects even mobile devices, thus making it even harder to patch up and fix.</p>
<p>This is a set of attacks that involve unexpected and incorrect execution of the victim program that leaks the victim’s confidential data via a side channel. Unlike Meltdown, this affects virtually every device.</p>
<p>Intel processors are the most vulnerable to these bugs. AMD and ARM processors seem to be largely immune to the Meltdown bug. However, the Spectre affects everyone.</p>
<h2><strong>The bug fix</strong></h2>
<p>These two monstrous bugs work on the hardware level. When there’s a bug with the software, it’s much easier to find out and fix. Like the major bugs the popular software (OpenSSL – Heartbleed, Linux – Shellshock etc.), these hardware bugs are harder to fix.</p>
<p>In the case of Meltdown, it’s easier to temporarily patch the software system. Linux, Windows, OS X etc. have already released a patch for this one. However, the work on Spectre is still ongoing.</p>
<h2><strong>How to stay secure</strong></h2>
<p>These bugs are pretty difficult to exploit. Unfortunately, these are hard to fix and hackers will always try to use these exploits to their advantages.</p>
<p>For end users, it’s pretty difficult but several steps will surely slow down any hacker.</p>
<ul>
<li>Update all your software to the latest version.</li>
<li>Whenever available, update your device drivers.</li>
<li>Update your anti-malware tool and scan your system for any malicious tool. You can check out for <a href="https://www.osradar.com/best-free-antimalware-tools-for-windows/">the best antimalware tools</a>.</li>
<li>Apply any system patch if available.</li>
</ul>
<p>All the tech giants are already working to fix these flaws. AMD believes that they’re on the least. Microsoft relied heavily on Intel processors. They’re going to have a patch very soon. Linux devs already released a fix. Apple’s patch for macOS, iOS, tvOS is on the way. Google has already safeguarded their products and services from the flaw.</p>
<p>In the case of Intel processors, the current fix ensures security in the cost of performance. However, we need to wait quite a long time until every single hardware is patched up. It’s a reminder for the future technologies not to ignore any single bit to test for any security threat. We hope that all the new upcoming processors won’t have these flaws anymore.</p>
<p>Until everything’s alright, just stay tight and alerted!</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/meltdown-spectre-computers-stake/">The Meltdown and Spectre – All Computers at Stake</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/meltdown-spectre-computers-stake/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
