<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Spectre Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/spectre/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Thu, 21 Jun 2018 20:42:05 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>The Ghost of Spectre Again – SpectreNG</title>
		<link>https://www.osradar.com/the-ghost-of-spectre-again-spectreng/</link>
					<comments>https://www.osradar.com/the-ghost-of-spectre-again-spectreng/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Tue, 22 May 2018 10:45:40 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[new spectre bug]]></category>
		<category><![CDATA[new spectre variant]]></category>
		<category><![CDATA[new spectre vulnerability]]></category>
		<category><![CDATA[Spectre]]></category>
		<category><![CDATA[spectreng]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=3188</guid>

					<description><![CDATA[<p>The Spectre is one of the major modern CPU bugs that were identified at the end of 2017. Along with the Meltdown, these bugs turned the world of security upside down. Even after such a long time, the ghost of Spectre is still haunting us. Recently, security researchers from Google and Microsoft have disclosed the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/the-ghost-of-spectre-again-spectreng/">The Ghost of Spectre Again – SpectreNG</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Spectre is one of the major modern CPU bugs that were identified at the end of 2017. Along with the Meltdown, these bugs turned the world of security upside down. Even after such a long time, the ghost of Spectre is still haunting us. Recently, security researchers from Google and Microsoft have disclosed the existence of a new variant of the Spectre, codenamed Spectre variant 4.</p>
<h3>The new flaw</h3>
<p>Interestingly, the news of such a possible security flaw went out previously on a German magazine. However, the official statement and description came out very recently,</p>
<p>This new variant of Spectre infects processors from Intel, AMD, ARM and IBM. Companies like Intel, Microsoft, Ubuntu, Red Hat, IBM, ARM, AMD etc. have already published security advisories explaining the working method of this bug along with all the possible mitigation advices.</p>
<h3>SpectreNG</h3>
<p>This new variant of Spectre has also earned a nice name to call – SpectreNG. Both the researchers of Microsoft and Google identified the vulnerability independently. Both bug discovery have very similarities. That’s why they are classified as Spectre variant 3a and 4. The Spectre variant 3a is tagged as CVE-2018-3640 and variant 4 is tagged as CVE-2018-3639.</p>
<p>The variant 3a is a form of the Meltdown flaw whereas variant 4 is completely new attack from the Spectre family. As you may have already guessed, both of them are caused by speculative execution – a method that enables all the faster processing power of all the modern CPUs.</p>
<p>For understanding the working method of both of the vulnerabilities, take a look at this video that Red Hat published on YouTube.</p>
<p><iframe loading="lazy" width="696" height="392" src="https://www.youtube.com/embed/Uv6lDgcUAC0?feature=oembed" frameborder="0" allow="autoplay; encrypted-media" allowfullscreen></iframe></p>
<p>According to Microsoft’s advisory, an attacker successfully exploiting the vulnerability can be able to read privileged data across trust boundaries. Such condition may break down the system of sandbox environment.</p>
<p>From Google’s part, Jann Horn, the man who was behind the invention of Meltdown and Spectre flaws, has also published the <a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=1528">proof-of-concept code</a> for the vulnerability. Unfortunately, a remove JavaScript code can successfully exploit the Spectre variant 4. According to Microsoft, there’s been no attempt recorded trying to exploit the vulnerability.</p>
<h3>Additional patches</h3>
<p>Intel’s general manager of Product Assurance and Security, Leslie Culbertson, said that the original patches for Meltdown and Spectre should be enough for mitigating the variant 4.</p>
<p>However, Intel has already released a new patch for the Spectre variant 4. It’s in the beta form and sent to OEMs.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/the-ghost-of-spectre-again-spectreng/">The Ghost of Spectre Again – SpectreNG</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/the-ghost-of-spectre-again-spectreng/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SgxSpectre – Improved Spectre Exploit Revealed</title>
		<link>https://www.osradar.com/sgxspectre-improved-spectre-exploit-revealed/</link>
					<comments>https://www.osradar.com/sgxspectre-improved-spectre-exploit-revealed/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Mon, 05 Mar 2018 10:00:32 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[sgxspectre]]></category>
		<category><![CDATA[Spectre]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=2083</guid>

					<description><![CDATA[<p>The Spectre is one of the most critical bugs of the modern processors that’s really hard to defend against without hardware upgrade. Although system patches are available, they aren’t the permanent solution. Spectre is hard to exploit, but a new variation of the method can successfully use the vulnerability. This new variation is discovered by [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/sgxspectre-improved-spectre-exploit-revealed/">SgxSpectre – Improved Spectre Exploit Revealed</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Spectre is one of the most critical bugs of the modern processors that’s really hard to defend against without hardware upgrade. Although system patches are available, they aren’t the permanent solution. Spectre is hard to exploit, but a new variation of the method can successfully use the vulnerability. This new variation is discovered by six scientists from the Ohio State University. This new attack is able to extract info from Intel SGX enclaves, thus named SgxSpectre.</p>
<h3>What is SGX?</h3>
<p><img loading="lazy" class="size-full wp-image-2085 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/03/intel-sgx-tool.jpg" alt="" width="760" height="420" srcset="https://www.osradar.com/wp-content/uploads/2018/03/intel-sgx-tool.jpg 760w, https://www.osradar.com/wp-content/uploads/2018/03/intel-sgx-tool-300x166.jpg 300w, https://www.osradar.com/wp-content/uploads/2018/03/intel-sgx-tool-696x385.jpg 696w" sizes="(max-width: 760px) 100vw, 760px" /></p>
<p>The SGX (Intel Software Guard eXtension) is a feature of Intel processors allowing apps to create so-called enclaves that are hardware-isolated sections of the processor’s processing memory where apps run sensitive operations like encryption keys, passwords, user data etc. The Meltdown and Spectre flaws revealed last year shows that such information can be stolen from the processor’s memory due to the bugged system mechanism. However, the classic form of Meltdown or Spectre wasn’t enough to extract data from the SGX enclaves.</p>
<h3>How SgxSpectre works</h3>
<p>SgxSpectre is the perfect solution that can steal data from the Intel’s SGX enclaves. According to the researchers, the SgxSpectre is capable of doing so because of the specific code pattern in the software libraries that allowed devs to integrated SGX support in their apps. The vulnerable SGX SDKs include Rust-SGX, Graphene-SGX, and Intel SGX.</p>
<p>A hacker, in theory, and practice can leverage the patterns of repetitive code execution that these SDKs introduce in SGX enclaves. Thus, the hacker can watch small variations of cache size. This is the process named “classic side-channel attack” and it’s quite effective in the field.</p>
<p>According to the researchers, SgxSpectre compromises the confidentiality of SGX enclaves completely because of the vulnerable code execution patterns. As these are difficult to eliminate, SgxSpectre attack can be performed against any programs that use the SGX enclave facility.</p>
<p>It’s notable that the concept of SGX enclave is still in the early days. Because of the facilities, its adoption is also quite fast-paced including the public clouds. Almost all the present SGX libraries contain the flawed execution pattern and are extremely hard to remove.</p>
<p>Here&#8217;s how it works.</p>
<h3>Security incoming</h3>
<p>The recent fixes from Intel for Spectre didn’t prove their worth, as those were easy to work around. According to Intel’s reaction to this SgxSpectre, Intel SGX SDK is going to have an update on 16 March 2018. App developers must integrate the new SGX SDK libraries into their SGX-enabled apps and issue updates to the users.</p>
<p>According to the researchers, those apps who use Google’s Retpoline anti-Spectre coding techniques are safe from SgxSpectre. That’s a nice relief that Google’s apps aren’t vulnerable to the new Spectre exploit.</p>
<p>For staying secured, update all the apps in your system as soon as available. It’s important to defend against heinous attackers. The proof-of-concept code is publicly available on <a href="https://github.com/osusecLab/SgxPectre">GitHub</a>. Here’s also a demonstration that shows the practical usage of SgxSpectre.</p>
<p>Intel announced that they’ll be shipping processors free of Meltdown and Spectre in 2018. However, it’s still not 100% guaranteed that such exploits won’t be available. Take a look ho<a href="https://www.osradar.com/more-spectre-like-flaws-might-happen-again/">w more Meltdown and Spectre flaws may emerge</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/sgxspectre-improved-spectre-exploit-revealed/">SgxSpectre – Improved Spectre Exploit Revealed</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/sgxspectre-improved-spectre-exploit-revealed/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Meltdown and Spectre Exploits are Available!</title>
		<link>https://www.osradar.com/meltdown-and-spectre-exploits-available/</link>
					<comments>https://www.osradar.com/meltdown-and-spectre-exploits-available/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Fri, 16 Feb 2018 13:18:32 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Meltdown]]></category>
		<category><![CDATA[meltdown and spectre]]></category>
		<category><![CDATA[Spectre]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1927</guid>

					<description><![CDATA[<p>We all have heard about the Meltdown and Spectre – two serious bugs found in the systems of all the chips that would allow hackers to access unwanted information without any warning. Hackers already are trying to use these exploits. In theory, these bugs are hard to exploit. But presently, security researchers succeeded in creating [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/meltdown-and-spectre-exploits-available/">Meltdown and Spectre Exploits are Available!</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>We all have heard about the Meltdown and Spectre – two serious bugs found in the systems of all the chips that would allow hackers to access unwanted information without any warning. Hackers already are trying to use these exploits. In theory, these bugs are hard to exploit. But presently, security researchers succeeded in creating working exploits that use Meltdown and Spectre and able to steal info.</p>
<p>Security experts from Princeton University and NVIDIA have currently authored a new research paper that explains the “MeltdownPrime” and “SpectrePrime”. These exploits use the side-channel timing attacks to leverage the modern processor flaws. The attacks are able to extract data from the processor’s cache memory that might contain confidential info like passwords.</p>
<p>According to the report of the Register, the proof-of-concept exploit “SpectrePrime” has been successfully used on a MacBook with Intel Core i7 processor. However, the MeltdownPrime hasn’t been successful to demonstrate the capability of an actual hardware. Note that Meltdown massively infects Intel chips.</p>
<h3>The Risk</h3>
<p>Fortunately, we don’t have to panic just yet. For security reason, the codes used for creating the exploits haven’t been released, ensuring no imminent risk for the time being. However, the security experts developed exploits in the lab, meaning that the real criminals are already on the brink of creating such exploits. The current system patches are able to protect from Meltdown and Spectre like MeltdownPrime, SpectrePrime, and other potential exploits. We’re now waiting for Intel to release an official patch for these bugs.</p>
<p>According to security researchers, processor manufacturers might be facing extreme difficulty in making hardware changes to ensure immunity from these bugs. The flaws are so deeply integrated with the current silicon processors that covering the Meltdown and Spectre along with all the possible flaws might be extremely difficult.</p>
<h3>Flawless Processors</h3>
<p>The easiest and the most effective solution now is to change the hardware that can be costly for most. Intel announced that they’ll release Meltdown and Spectre free processors will arrive later this year. AMD also announced that their Meltdown and Spectre free processor (Zen 2 architecture) will arrive market in 2019. Until then, we have to stick with the software patches that has become a real mess all around the world. It’s also a matter to consider whether those will be really free from these bugs.</p>
<h3>Intel&#8217;s Bug Bounty</h3>
<p>In the meantime, Intel has increased the price of ‘bug bounty’ to get more help from the community on different flaws. The scheme is currently offering $250,000 for side-channel bugs/flaws like Meltdown and Spectre. The bounty for other channels has become around $100,000.</p>
<p>This program is available for everyone. That means that now, any security researcher may contribute to processors whereas previously, Intel only allowed invited researchers. This ensures that more people are hunting down the bug(s) and hopefully, find them out faster before the world knows them.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/meltdown-and-spectre-exploits-available/">Meltdown and Spectre Exploits are Available!</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/meltdown-and-spectre-exploits-available/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>KernelCare from CloudLinux – Promise to Fix Meltdown and Spectre without Reboot</title>
		<link>https://www.osradar.com/kernelcare-cloudlinux-promise-fix-meltdown-spectre-without-reboot/</link>
					<comments>https://www.osradar.com/kernelcare-cloudlinux-promise-fix-meltdown-spectre-without-reboot/#respond</comments>
		
		<dc:creator><![CDATA[Mel K]]></dc:creator>
		<pubDate>Mon, 12 Feb 2018 07:51:28 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CloudLinux]]></category>
		<category><![CDATA[kernelcare]]></category>
		<category><![CDATA[Meltdown]]></category>
		<category><![CDATA[meltdown and spectre]]></category>
		<category><![CDATA[Spectre]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1891</guid>

					<description><![CDATA[<p>CloudLinux is a great Linux security solution provider with awesome products and services. For enterprise level, CloudLinux is a highly dependable and reputed firm. KernelCare, their genius Linux kernel patching service allows installing kernel patches without rebooting the system. This system allows installing the Meltdown and Spectre patches without the system reboot. The Meltdown and [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/kernelcare-cloudlinux-promise-fix-meltdown-spectre-without-reboot/">KernelCare from CloudLinux – Promise to Fix Meltdown and Spectre without Reboot</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>CloudLinux is a great Linux security solution provider with awesome products and services. For enterprise level, CloudLinux is a highly dependable and reputed firm. KernelCare, their genius Linux kernel patching service allows installing kernel patches without rebooting the system. This system allows installing the Meltdown and Spectre patches without the system reboot.</p>
<p>The Meltdown and Spectre are the biggest security flaws till date. The core of the operating systems and flawed working method of modern CPUs allowed these bugs to be present for decades. They remained hidden until the end of 2017 when security researchers discovered them. The news shook the security platform, of course.</p>
<p>The very important thing is, Linux was the most vulnerable one of all. As Linux runs on the top level computers like servers, supercomputers etc. it’s important to keep them running for more productivity. However, when installing kernel patches, every device generally need to reboot to complete the action. With the help of KernelCare, it can complete without any reboot.</p>
<h3>The kernel patch</h3>
<p>Kernel patches can easily mitigate the vulnerability of a system to Meltdown and Spectre. The Meltdown can be disabled via the kernel, but Spectre is a difficult one. Yet, kernel patches will make them harder to exploit for hackers, a temporary solution. When installing them, the device must reboot to complete the process. Sure, it’s not big of an issue for general users like us. But when it’s a server or supercomputer we’re talking about huge business – any slight disturbance might cause unexpected situations.</p>
<h3>KernelCare features</h3>
<p><img loading="lazy" class="size-full wp-image-1893 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/02/kernelcare-no-reboot.png" alt="" width="858" height="467" srcset="https://www.osradar.com/wp-content/uploads/2018/02/kernelcare-no-reboot.png 858w, https://www.osradar.com/wp-content/uploads/2018/02/kernelcare-no-reboot-300x163.png 300w, https://www.osradar.com/wp-content/uploads/2018/02/kernelcare-no-reboot-768x418.png 768w, https://www.osradar.com/wp-content/uploads/2018/02/kernelcare-no-reboot-696x379.png 696w, https://www.osradar.com/wp-content/uploads/2018/02/kernelcare-no-reboot-772x420.png 772w" sizes="(max-width: 858px) 100vw, 858px" /></p>
<p>That’s where KernelCare comes in handy. According to CloudLinux, KernelCare is now capable of applying the Meltdown and Spectre patches for RHEL 7, CentOS 7 &amp; 7+, Promox Virtual Environment 3.10 and CloudLinxu 7 series OS.</p>
<p>For using the service of KernelCare, the subscription charge is $2.25 per server per month. If you have any doubt about the product, you can also take a trial for 30 days. Moreover, CloudLinux also promises to bring support for more GNU/Linux distributions very soon. The list includes Ubuntu, Debian, CloudLinux 6, RHEL 6, Virtuozzo 6 series and CentOS 6. However, a fact CloudLinux covered is Xen PV &#8211; they won&#8217;t support it. Xen PV is widely used by enterprises and cloud providers.</p>
<p>Ubuntu LTS series seeming comes up with a similar service like KernelCare, but that patching service (Canonical Livepatch Service) isn’t able of live patching the Meltdown and Spectre vulnerabilities. So, until the Canonical Livepatch Service comes up with the Meltdown and Spectre patches, you can go with KernelCare for your business. Take a look at KernelCare.</p>
<p>If you’re not interested in KernelCare, you can also use tools that will identify any attempt of exploiting Meltdown. The tool will cover Spectre in the future. The tool is available for Linux. <a href="https://www.osradar.com/meltdown-defense-linux-tool-sentinelone/">Check out the Linux tool</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/kernelcare-cloudlinux-promise-fix-meltdown-spectre-without-reboot/">KernelCare from CloudLinux – Promise to Fix Meltdown and Spectre without Reboot</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/kernelcare-cloudlinux-promise-fix-meltdown-spectre-without-reboot/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Windows Update to Kill Spectre Patch</title>
		<link>https://www.osradar.com/windows-update-kill-spectre-patch/</link>
					<comments>https://www.osradar.com/windows-update-kill-spectre-patch/#respond</comments>
		
		<dc:creator><![CDATA[Mel K]]></dc:creator>
		<pubDate>Tue, 30 Jan 2018 16:22:18 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Meltdown]]></category>
		<category><![CDATA[meltdown and spectre]]></category>
		<category><![CDATA[Spectre]]></category>
		<category><![CDATA[spectre and meltdown]]></category>
		<category><![CDATA[windows update]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1654</guid>

					<description><![CDATA[<p>The Meltdown and Spectre – the biggest and massive flaw discovered in the core design of modern CPUs starting from 1995. These flaws were present there for decades until we discovered what they are. Thanks to the security research teams, the whole world is in a danger of security threats. As they’re publicly disclosed, both [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/windows-update-kill-spectre-patch/">Windows Update to Kill Spectre Patch</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Meltdown and Spectre – the biggest and massive flaw discovered in the core design of modern CPUs starting from 1995. These flaws were present there for decades until we discovered what they are. Thanks to the security research teams, the whole world is in a danger of security threats. As they’re publicly disclosed, both the users and hackers know about them. Rest assured, hackers are working heart and soul to use them to their advantages.</p>
<h3>The Spectre patch</h3>
<p>The Meltdown was relatively easy to resolve using software patches. A few kernel tweaks and changes are enough to mitigate exploitation of the Meltdown. The kernel is the core software of any OS. It works in-between the hardware and software. However, the Spectre is a harder one.</p>
<p>Microsoft has published a Windows update for disabling microcode patches released earlier for the Spectre variant 2 – Branch Target Injection (CVE-2017-5715) vulnerability. Microsoft released this counter patch after a week Intel asked customers and OEMs to stop deploying the buggy security patches. According to Intel, those patches might introduce more reboots than expected and unpredictable system behavior.</p>
<h3>The reason</h3>
<p>Why is Microsoft disabling the patch? The answer from Microsoft was quite logical. Unstable systems will eventually cause data loss or corruption. Think of a scenario like this: you’re working hard on your next day assignment or in the middle of an ongoing project, then your system reboots out of nowhere (unexpected reboots). This is more annoying than Spectre, I believe.</p>
<p>However, you don’t need to worry about the Meltdown and Spectre right now. These security flaws are, by their nature, is very hard to pull off. The Meltdown is relatively easier to pull off compared to Spectre. The Spectre requires a deeper knowledge of the victim’s programs’ inner workings. As you guessed, not every hacker is that much good. Moreover, there has been no report of using Spectre variant 2 (CVE-2017-5715) to exploit a system.</p>
<h3>What to do</h3>
<p>Windows will automatically download and install the update via Windows Update. The update is also available to download from the <a href="https://www.catalog.update.microsoft.com/ScopedViewInline.aspx?updateid=20ff3247-bd92-4683-9094-c298e9c6125f">Microsoft Catalog</a>. The update ID is KB4078130 and size is 24KB. For advanced users, Microsoft also describes a method to disable the Spectre variant 2 patch using Windows Registry. Two guides are available – for <a href="https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in">desktops</a> and <a href="https://support.microsoft.com/en-us/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution">servers</a>.</p>
<p><img loading="lazy" class="size-full wp-image-1656 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/01/microsoft-update-catalog.png" alt="" width="1365" height="343" srcset="https://www.osradar.com/wp-content/uploads/2018/01/microsoft-update-catalog.png 1365w, https://www.osradar.com/wp-content/uploads/2018/01/microsoft-update-catalog-300x75.png 300w, https://www.osradar.com/wp-content/uploads/2018/01/microsoft-update-catalog-768x193.png 768w, https://www.osradar.com/wp-content/uploads/2018/01/microsoft-update-catalog-1024x257.png 1024w, https://www.osradar.com/wp-content/uploads/2018/01/microsoft-update-catalog-696x175.png 696w, https://www.osradar.com/wp-content/uploads/2018/01/microsoft-update-catalog-1068x268.png 1068w" sizes="(max-width: 1365px) 100vw, 1365px" /></p>
<p>It’s mostly Intel to blame for the issues. Intel has earned a really bad reputation in the press and the community for their inability to provide necessary &amp; flawless security fix for the speculative execution bugs. Speculative execution is such a blazing technique that boosts the performance far ahead. However, Intel’s CEO Brian Krzanich said that we may see new Intel processors free of these bugs within 2018. If you’re interested in learning more about the Meltdown and Spectre bug, check out the <a href="https://www.osradar.com/meltdown-spectre-computers-stake/">complete details</a>.</p>
<p>If you’re a Windows user, you already know how much time + bandwidth consuming process is Windows Update. Using a 3<sup>rd</sup>-party tool, you can cut this short several times! Check out <a href="https://www.osradar.com/how-to-update-windows-offline/">how to use WSUS Offline Update</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/windows-update-kill-spectre-patch/">Windows Update to Kill Spectre Patch</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/windows-update-kill-spectre-patch/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fake Meltdown and Spectre Patch – Beware of Malware</title>
		<link>https://www.osradar.com/fake-meltdown-spectre-patch-beware-malware/</link>
					<comments>https://www.osradar.com/fake-meltdown-spectre-patch-beware-malware/#respond</comments>
		
		<dc:creator><![CDATA[Mel K]]></dc:creator>
		<pubDate>Tue, 30 Jan 2018 10:46:37 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[fake meltdown patch]]></category>
		<category><![CDATA[fake patch]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Meltdown]]></category>
		<category><![CDATA[smoke loader]]></category>
		<category><![CDATA[Spectre]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1648</guid>

					<description><![CDATA[<p>The Meltdown and Spectre are, by far, the biggest security flaw ever discovered. It challenged how we perceive our hardware and software in the field of security. These 2 bugs affect almost all the processors – Intel, AMD, ARM etc. all. Different systems are affected differently, but all of them require proper patches. Researchers and [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/fake-meltdown-spectre-patch-beware-malware/">Fake Meltdown and Spectre Patch – Beware of Malware</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Meltdown and Spectre are, by far, the biggest security flaw ever discovered. It challenged how we perceive our hardware and software in the field of security. These 2 bugs affect almost all the processors – Intel, AMD, ARM etc. all. Different systems are affected differently, but all of them require proper patches. Researchers and developers are working hard to provide the best software solution, as hardware solution requires processor replacement, a very costly process that not everyone can pursue. A security patch is the best solution for now.</p>
<p>Hackers are never falling behind the trend of the present. They’re also trying hard to use these flaws to exploit systems. In this series of attempts, they’re now releasing fake update packages in the name of system patches. That package contains a heinous malware to take over your system.</p>
<h3>Smoke Loader</h3>
<p>Malwarebytes spotted that fake package. The firm has also identified a new domain that contains a whole bunch of info on how Meltdown and Spectre affect CPUs. Apparently, the website also contains some content from the German Federal Office for Information Security (BSI). The fake package is a ZIP archive link. The file name was “Intel-AMD-SecurityPatch-10-1-v1.exe”.</p>
<h3>How it works</h3>
<p>A victim trying to download and deploy the file installs Smoke Loader malware without any knowledge. Moreover, the installed malware downloads several more payloads by connecting to various domains and start sending encrypted data to servers. The website was also sending fake phishing emails. Here’s a screenshot of the website.</p>
<p><img loading="lazy" class="alignnone size-full wp-image-1649" src="https://www.osradar.com/wp-content/uploads/2018/01/fake-meltdown-spectre-patch-website.png" alt="" width="1061" height="777" srcset="https://www.osradar.com/wp-content/uploads/2018/01/fake-meltdown-spectre-patch-website.png 1061w, https://www.osradar.com/wp-content/uploads/2018/01/fake-meltdown-spectre-patch-website-300x220.png 300w, https://www.osradar.com/wp-content/uploads/2018/01/fake-meltdown-spectre-patch-website-768x562.png 768w, https://www.osradar.com/wp-content/uploads/2018/01/fake-meltdown-spectre-patch-website-1024x750.png 1024w, https://www.osradar.com/wp-content/uploads/2018/01/fake-meltdown-spectre-patch-website-80x60.png 80w, https://www.osradar.com/wp-content/uploads/2018/01/fake-meltdown-spectre-patch-website-696x510.png 696w, https://www.osradar.com/wp-content/uploads/2018/01/fake-meltdown-spectre-patch-website-574x420.png 574w" sizes="(max-width: 1061px) 100vw, 1061px" /></p>
<p>Here is the file that contains the malware. Note that Smoke Loader is capable of loading other bunches of malware additionally to wreak havoc on your system.</p>
<p><img loading="lazy" class="alignnone size-full wp-image-1650" src="https://www.osradar.com/wp-content/uploads/2018/01/smoke-loader-fake-security-patch.png" alt="" width="772" height="583" srcset="https://www.osradar.com/wp-content/uploads/2018/01/smoke-loader-fake-security-patch.png 772w, https://www.osradar.com/wp-content/uploads/2018/01/smoke-loader-fake-security-patch-300x227.png 300w, https://www.osradar.com/wp-content/uploads/2018/01/smoke-loader-fake-security-patch-768x580.png 768w, https://www.osradar.com/wp-content/uploads/2018/01/smoke-loader-fake-security-patch-80x60.png 80w, https://www.osradar.com/wp-content/uploads/2018/01/smoke-loader-fake-security-patch-696x526.png 696w, https://www.osradar.com/wp-content/uploads/2018/01/smoke-loader-fake-security-patch-556x420.png 556w" sizes="(max-width: 772px) 100vw, 772px" /></p>
<p>The identifier of the malware, Malwarebytes already contacted with CloudFlare and Comodo on such abuse. Even if this attack is diminished, hackers are already on the edge of inventing other methods.</p>
<h3>How to stay protected</h3>
<p>To stay protected, it’s always necessary to stay vigilant and aware of such spoofing. You need to use the best antivirus or internet security software to prevent any malware injection into your system. You’re also recommended to take a look at the <a href="https://www.osradar.com/best-antivirus-software-2018/">top antivirus software 2018</a>.</p>
<p>Because of the Meltdown and Spectre, Linux is the most vulnerable to these attacks. Linux is the most used OS in the top level of cyber world – supercomputers, servers etc. all run on it. Fortunately, there’s a tool that will take care of any Meltdown attack, allowing system admins not to install the buggy Meltdown patch that slowed down the system. <a href="https://www.osradar.com/meltdown-defense-linux-tool-sentinelone/">Learn more about the tool</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/fake-meltdown-spectre-patch-beware-malware/">Fake Meltdown and Spectre Patch – Beware of Malware</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/fake-meltdown-spectre-patch-beware-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Automated Tool from Linux Lite Devs – Check for Meltdown and Spectre</title>
		<link>https://www.osradar.com/automated-tool-from-linux-lite-devs-check-for-meltdown-and-spectre/</link>
					<comments>https://www.osradar.com/automated-tool-from-linux-lite-devs-check-for-meltdown-and-spectre/#comments</comments>
		
		<dc:creator><![CDATA[Mel K]]></dc:creator>
		<pubDate>Thu, 25 Jan 2018 06:25:45 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[linux tool]]></category>
		<category><![CDATA[Meltdown]]></category>
		<category><![CDATA[meltdown and spectre]]></category>
		<category><![CDATA[Spectre]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1539</guid>

					<description><![CDATA[<p>In the recent days, the Meltdown and Spectre have been a really hot topic. Major system flaw in almost all the modern processors, in theory, can allow a hacker to compromise any system, regardless of security measures. Most importantly, antivirus or protection software isn’t able to block them. Now, for Linux users, a new checker [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/automated-tool-from-linux-lite-devs-check-for-meltdown-and-spectre/">Automated Tool from Linux Lite Devs – Check for Meltdown and Spectre</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In the recent days, the Meltdown and Spectre have been a really hot topic. Major system flaw in almost all the modern processors, in theory, can allow a hacker to compromise any system, regardless of security measures. Most importantly, antivirus or protection software isn’t able to block them. Now, for Linux users, a new checker tool is available to check out the scope of Meltdown and Spectre.</p>
<p>If you don’t know how Meltdown and Spectre works, here’s a summary. Every modern processor uses a method called “speculative execution”. This method makes the processor function blazingly faster. Using the method, a hacker can execute such a program that can disclose sensitive info from other apps. Learn in-depth about the Meltdown and Spectre bug <a href="https://www.osradar.com/meltdown-spectre-computers-stake/">here</a>.</p>
<p>For Windows users, there’s a tool called InSpectre. This tool will analyze your system and tell if you’re vulnerable to these bugs. <a href="https://www.grc.com/inspectre.htm">Get InSpectre</a>. However, for Linux users, this type of tool wasn’t available. Thankfully, Linux Lite developers created such a tool for every Linux distro. Linux Lite is a Linux distro based on Ubuntu.</p>
<h3>How to use</h3>
<p>The tool is very simple to use. It’s a CLI tool, so please be focused.</p>
<ul>
<li><a href="https://github.com/linuxlite/Spectre-Meltdown-Checker-Automated/archive/master.zip">Download the Spectre Meltdown Checker Automated from GitHub</a>.</li>
<li>Extract the ZIP archive in a folder.</li>
<li>Open a terminal in that directory and run the following command:</li>
<li>Double-click on “sm-start” or run the following command:</li>
</ul>
<pre class="lang:default decode:true ">chmod +x sm-*</pre>
<p>If you&#8217;re using XFCE with Thunar, use the following command:</p>
<pre class="lang:default decode:true">xfconf-query --channel thunar --property /misc-exec-shell-scripts-by-default --create --type bool --set true</pre>
<p>It’ll show an output like in the GIF shown below.</p>
<p><img loading="lazy" class="alignnone size-full wp-image-1540" src="https://www.osradar.com/wp-content/uploads/2018/01/spectre-meltdown-check-result.gif" alt="" width="1412" height="836" /></p>
<p>&nbsp;</p>
<p>If this tool seems a bit difficult, there’s another similar tool. It’s a very simple, plain shell script to check out for the vulnerabilities. <a href="https://github.com/speed47/spectre-meltdown-checker">Get the script Spectre &amp; Meltdown Checker</a>. When you run the script, you can see the following result. It’s a sample one.</p>
<p><img loading="lazy" class="alignnone wp-image-1541" src="https://www.osradar.com/wp-content/uploads/2018/01/meltdown-and-spectre-check-result-300x135.png" alt="" width="733" height="330" srcset="https://www.osradar.com/wp-content/uploads/2018/01/meltdown-and-spectre-check-result-300x135.png 300w, https://www.osradar.com/wp-content/uploads/2018/01/meltdown-and-spectre-check-result-768x346.png 768w, https://www.osradar.com/wp-content/uploads/2018/01/meltdown-and-spectre-check-result-1024x461.png 1024w, https://www.osradar.com/wp-content/uploads/2018/01/meltdown-and-spectre-check-result-696x313.png 696w, https://www.osradar.com/wp-content/uploads/2018/01/meltdown-and-spectre-check-result-1068x481.png 1068w, https://www.osradar.com/wp-content/uploads/2018/01/meltdown-and-spectre-check-result-933x420.png 933w, https://www.osradar.com/wp-content/uploads/2018/01/meltdown-and-spectre-check-result.png 1180w" sizes="(max-width: 733px) 100vw, 733px" /></p>
<h3>What to do now</h3>
<p>After running this tool, you’ll know whether you’re vulnerable to any of the flaws. If you’re not, congratulations! In case your system is vulnerable, you need to think about it.</p>
<p>Whatever your system’s status is, it’s the best to run a system update. Different Linux distros follow different rules to manage and update the system. Here’s a detailed <a href="https://www.linux.com/learn/linux-101-updating-your-system">guide to update &amp; upgrade your Linux</a>.</p>
<p>Here’s a caution – don’t install Intel’s latest microcode. Different specialists are criticizing the buggy and troublesome patch from Intel. Many computers simply started reboot unexpectedly along with some other issues. So, for now, it’s the best to stay out of that microcode update.</p>
<p>For Linux users, Linux Lite can make a big change to your perspective and a refreshing desktop. It’s based on Ubuntu, the most popular Linux distro ever. It’s mostly focused on simplicity and faster performance. <a href="https://www.linuxliteos.com/">Check out Linux Lite today</a>!</p>
<p>Have you checked your system? If not, do it now. The Meltdown and Spectre is a result of faulty processors, mostly Intel processors. These flaws can’t be removed completely without hardware replacement. However, using software upgrades, we can mitigate the danger.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/automated-tool-from-linux-lite-devs-check-for-meltdown-and-spectre/">Automated Tool from Linux Lite Devs – Check for Meltdown and Spectre</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/automated-tool-from-linux-lite-devs-check-for-meltdown-and-spectre/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>More Meltdown and Spectre Flaws Incoming!</title>
		<link>https://www.osradar.com/more-spectre-like-flaws-might-happen-again/</link>
					<comments>https://www.osradar.com/more-spectre-like-flaws-might-happen-again/#respond</comments>
		
		<dc:creator><![CDATA[Mel K]]></dc:creator>
		<pubDate>Thu, 18 Jan 2018 06:12:35 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Meltdown]]></category>
		<category><![CDATA[meltdown and spectre]]></category>
		<category><![CDATA[Spectre]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1420</guid>

					<description><![CDATA[<p>After the Meltdown and Spectre, a huge security shock hit the world. Almost all the modern processors are vulnerable to these flaws. The Meltdown affects mostly all the Intel processors, whereas the Spectre affects all processors including ARM, AMD, and Intel. Every manufacturer is working on the bug and released several patches to fix the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/more-spectre-like-flaws-might-happen-again/">More Meltdown and Spectre Flaws Incoming!</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>After the Meltdown and Spectre, a huge security shock hit the world. Almost all the modern processors are vulnerable to these flaws. The Meltdown affects mostly all the Intel processors, whereas the Spectre affects all processors including ARM, AMD, and Intel. Every manufacturer is working on the bug and released several patches to fix the issues. According to Arm Holdings CEO Simon Segars, we might even find out more bugs in the systems that seem to be safe at present.</p>
<p>Using the Meltdown and Spectre flaws, a hacker could theoretically pull out sensitive info out of the system. As we know how these bugs work, we can fix them despite the cost. However, Simon Segars tells us that more flaws are yet to be found out in the systems. In an interview at CES 2018, he said, “The reality is there are probably other things out there like it that have been deemed safe for years. Somebody whose mind is sufficiently warped toward thinking about security threats may find other ways to exploit systems which had otherwise been considered completely safe.”</p>
<h3>The cause of Meltdown and Spectre</h3>
<p>The reason why Meltdown and Spectre grew up is the speculative execution. It’s a hardware technique that allows a processor to perform significantly faster. If we are to avoid the exploits, we have to get rid of the “speculative execution”. This is way too much to give up. Segars said that the speed boost is too significant to remove it from advanced chipsets.</p>
<h3>Cybersecurity</h3>
<p>Simon Segars also puts force on cybersecurity, “cybersecurity is a mess”. Cyberspace needs 100% security as AI and IoT are getting more and more traction in the cyber world. Flaws like Meltdown and Spectre will simply put everything at a great risk in these scenarios.</p>
<p>“It really is mind-bending what people have done to exploit this side effect”, Simon Segars said. “Nobody thought of it before. Like all discoveries, they&#8217;re only obvious after the point they&#8217;re discovered.” It’s true that companies are adopting speculative execution for years, and none thought about the potential of vulnerability. According to Segars, “But what you&#8217;ll see is [that] the end system is a combination of software and hardware. How it&#8217;s written and tested &#8212; all of that will evolve to make sure the risks of using that approach are well understood.”</p>
<p>ARM hasn’t decided to change their processor’s architecture or software yet for preventing any future security risks. Segars ensured that ARM will continue examining similar potential vulnerabilities while making processor tweaks.</p>
<p>Why didn’t ARM find the flaw itself? Segars answered, “What this demonstrates is that the world of security is a moving target. Just when you think you&#8217;ve got things under control, something else comes along.” The same statement is true for all other processor manufacturers.</p>
<h3>Check your system with InSpectre</h3>
<p>Is your system vulnerable to Meltdown and Spectre? You can now check using InSpectre tool. It’s a very small (&lt;1MB) tool for Windows PCs to check out your system’s status. <a href="https://www.grc.com/inspectre.htm">Get InSpectre</a>.</p>
<p>All we can do now is stay alert for any malware and keeping all our software and OS up-to-date. Until the systems are bug-free for good, we have to wait a long time (maybe years).</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/more-spectre-like-flaws-might-happen-again/">More Meltdown and Spectre Flaws Incoming!</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/more-spectre-like-flaws-might-happen-again/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Meltdown and Spectre – All Computers at Stake</title>
		<link>https://www.osradar.com/meltdown-spectre-computers-stake/</link>
					<comments>https://www.osradar.com/meltdown-spectre-computers-stake/#respond</comments>
		
		<dc:creator><![CDATA[Mel K]]></dc:creator>
		<pubDate>Sun, 07 Jan 2018 10:29:17 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[intel cpu bug]]></category>
		<category><![CDATA[Meltdown]]></category>
		<category><![CDATA[meltdown and spectre]]></category>
		<category><![CDATA[Spectre]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1080</guid>

					<description><![CDATA[<p>When it comes about electronic devices, security is the top priority here. However, with recent researches ongoing, we’re getting to know only that how vulnerable we are in the cyber world. A pair of a serious exploit, the Meltdown and Spectre in the most modern processors is discovered in the first week of January 2018. [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/meltdown-spectre-computers-stake/">The Meltdown and Spectre – All Computers at Stake</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>When it comes about electronic devices, security is the top priority here. However, with recent researches ongoing, we’re getting to know only that how vulnerable we are in the cyber world. A pair of a serious exploit, the Meltdown and Spectre in the most modern processors is discovered in the first week of January 2018. These two new vulnerabilities are known as the Meltdown and the Spectre exploit.</p>
<p>The Meltdown exploit was discovered by three teams – a team at Cyberus Technology, Jann Horn at Google Project Zero and a team at the Graz University of Technology. They discovered and reported the flaw independently.</p>
<p>The Spectre exploit was discovered by a team led by Paul Kocher along with representatives from the University of Pennsylvania, University of Adelaide, Data61, University of Maryland and Rambus. The flaw was identified and reported independently.</p>
<p>Why are these threats so dangerous? They allow a hacker to simply use the hardware resource to steal information while leaving no trace in the traditional log file! Even traditional antivirus software is unlikely to detect illegal access to programs using the exploit.</p>
<h2><strong>Why these bugs are serious</strong></h2>
<p>Unlike other heinous bugs found previously, these two bugs are more serious to date. The truth is, these bugs not only affects desktops &amp; laptops but also virtually all the company’s processors produced since 1995 with a few exception.</p>
<p>Both of these bugs allow unauthorized access to the processing data. Generally, a program isn’t allowed to read other apps’ data and is ensured by the hardware. Unfortunately, these bugs allow such action to perform.</p>
<h2><strong>How the Meltdown and Spectre work</strong></h2>
<p><strong>Meltdown</strong>: This one mainly affects most of the Intel processors. This bug works by breaking the barrier that prevents apps from getting access to arbitrary locations in the kernel memory. The kernel segregates and protects memory for every single process and keeps a barrier so that one can’t interfere with another’s data. However, the meltdown bug now makes this serious procedure unreliable. This flaw mostly makes desktops &amp; laptops vulnerable.</p>
<p>This flaw even allows anyone in the cloud to retrieve the data without any permission and privilege. Virtually, this affects every user of a personal computer. Intel’s “speculative execution” method used in the processors doesn’t fully segregate processes by low-privilege and high-privilege that are meant to be in the computer’s kernel memory.</p>
<p><strong>Spectre</strong>: Intel, AMD and ARM processors are affected by this bug. The working method is different than meltdown bug, however. This flaw tricks applications into disclosing the secured data inside their protected memory area. This exploit is harder to pull off. However, this bug affects even mobile devices, thus making it even harder to patch up and fix.</p>
<p>This is a set of attacks that involve unexpected and incorrect execution of the victim program that leaks the victim’s confidential data via a side channel. Unlike Meltdown, this affects virtually every device.</p>
<p>Intel processors are the most vulnerable to these bugs. AMD and ARM processors seem to be largely immune to the Meltdown bug. However, the Spectre affects everyone.</p>
<h2><strong>The bug fix</strong></h2>
<p>These two monstrous bugs work on the hardware level. When there’s a bug with the software, it’s much easier to find out and fix. Like the major bugs the popular software (OpenSSL – Heartbleed, Linux – Shellshock etc.), these hardware bugs are harder to fix.</p>
<p>In the case of Meltdown, it’s easier to temporarily patch the software system. Linux, Windows, OS X etc. have already released a patch for this one. However, the work on Spectre is still ongoing.</p>
<h2><strong>How to stay secure</strong></h2>
<p>These bugs are pretty difficult to exploit. Unfortunately, these are hard to fix and hackers will always try to use these exploits to their advantages.</p>
<p>For end users, it’s pretty difficult but several steps will surely slow down any hacker.</p>
<ul>
<li>Update all your software to the latest version.</li>
<li>Whenever available, update your device drivers.</li>
<li>Update your anti-malware tool and scan your system for any malicious tool. You can check out for <a href="https://www.osradar.com/best-free-antimalware-tools-for-windows/">the best antimalware tools</a>.</li>
<li>Apply any system patch if available.</li>
</ul>
<p>All the tech giants are already working to fix these flaws. AMD believes that they’re on the least. Microsoft relied heavily on Intel processors. They’re going to have a patch very soon. Linux devs already released a fix. Apple’s patch for macOS, iOS, tvOS is on the way. Google has already safeguarded their products and services from the flaw.</p>
<p>In the case of Intel processors, the current fix ensures security in the cost of performance. However, we need to wait quite a long time until every single hardware is patched up. It’s a reminder for the future technologies not to ignore any single bit to test for any security threat. We hope that all the new upcoming processors won’t have these flaws anymore.</p>
<p>Until everything’s alright, just stay tight and alerted!</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/meltdown-spectre-computers-stake/">The Meltdown and Spectre – All Computers at Stake</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/meltdown-spectre-computers-stake/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
