Install updates now to address a vulnerability in most Intel CPUs

In January 2018, a pair of security exploits dubbed Spectre and Meltdown showed how attackers could take advantage of commonly-implemented CPU technology to access data they shouldn't have been able to.

They were followed by a similar bug, Foreshadow , late last year, and now researchers have uncovered four different techniques that exploit Intel's speculative execution technology in a similar way.

If you have a computer using an Intel CPU released since 2011 then congratulations -- you've likely won a vulnerability, since only "select" 8th and 9th gen Core CPUs as well as 2nd generation Xeon Scalable CPUs have hardware protection against the attacks.

macOS , Windows , ChromeOS and Linux already have software updates to address MDS attacks, while Intel has also released microcode updates for some of its hardware ( PDF ) that you should get through motherboard and system vendors.

Just like Spectre and Meltdown, the fixes are expected to impact performance -- you can get more information on how much right here.

In this article: exploit , Fallout , gear , Intel , MDS , Meltdown , mobile , patch , personal computing , personalcomputing , RIDL , security , Spectre , speculative execution , vulnerability , Zombieload

Powered by Blogger.