Android, Antivirus, Apple, Chromebook, Enterprise, Internet Security, iPhone, Mobile, OS X

CPU Security Flaw (Meltdown and Spectre) – What you need to know

Processors (CPUs) provide the brainpower for all the computerized devices we use day to day, from PCs and smartphones down…

Processors (CPUs) provide the brainpower for all the computerized devices we use day to day, from PCs and smartphones down to mundane things such as ATMs. Therefore an exploit – or exploits – that affects virtually all of these devices at the same time is a shocking thing to hear about.

Unfortunately, early 2018 saw just such a thing happen with the news that a design flaw in nearly all modern processors had been found.
 

What are Meltdown and Spectre?

Meltdown and Spectre are the names given to the two newly discovered vulnerabilities that affect virtually every device with a processor in it.

They rely on retrieving small amounts of data that are made available outside of the processor temporarily. This happens due to a design in processors called “speculative execution”.

This is the process where a CPU essentially guesses what information it will need next to function quickly.

Spectre allows attackers to force the processor itself to start the speculative execution process. They then access the extra data to obtain sensitive information that should never be available.

Meltdown fundamentally breaks down the mechanism that stops applications from accessing system memory. By doing so it enables exploits to access arbitrary system memory to retrieve sensitive data.
 

Who discovered them?

Both exploits were independently discovered by multiple teams of researchers.

Meltdown

  • Jann Horn (Google Project Zero)
  • Werner Haas, Thomas Prescher (Cyberus Technology)
  • Daniel Gruss, Moritz Lipp, Stefan Mangard, Michael Schwarz(Graz University of Technology)

Spectre

  • Jann Horn (Google Project Zero)
  • Paul Kocher in collaboration with Daniel Genkin (University of Pennsylvania and University of Maryland), Mike Hamburg (Rambus), Moritz Lipp (Graz University of Technology), and Yuval Yarom (University of Adelaide and Data61)

 

What systems are affected?

On a technical level, every Intel processor that implements out-of-order execution (speculative execution) is potentially affected. This includes almost all Intel processors dating back all the way to 1995!
A portion of AMD processors and ARM processors are also affected.

All desktop, laptop and cloud computing services may be affected by Meltdown.
 

Am I affected by Meltdown and Spectre?

Yes!

This may seem like a very blunt answer but due to the wide-reaching nature of the design flaw, you almost certainly have a device that will have been affected.
 

Does my antivirus protect me?

Antivirus programs could theoretically detect the use of these exploits, however, in practice it is very unlikely. It is possible that your antivirus could detect malware designed to exploit these vulnerabilities but not the actual vulnerabilities themselves.
 

How do I protect myself?

The Meltdown exploit is able to be fixed with a software patch as it relies on breaking the isolation between user apps and the operating system.

Computers fitted with a vulnerable processor and running unpatched operating systems will be open to exploit.

Fortunately, Operating system vendors have released relevant patches to protect their users. As long as you regularly update your operating system using built-in update tools, you should be fully protected from the Meltdown vulnerability.

As usual, it is best to operate safe web browsing habits and not install any potential malware on to your device that may potentially make use of these vulnerabilities.

Spectre has proven to be much harder to protect from as it is executed at the hardware level.

Initial advice so far is to follow the basic steps (similar to meltdown):

  • Update your operating system frequently
  • Install updates from your hardware manufacturer (firmware updates)
  • Turn on isolation mode in your web browser ( Chrome and Firefox ) – This prevents exploits in javascript from utilizing Spectre vulnerability.

 

What next?

The main thing for most people to do is to not panic. If you have followed the basic security steps and best practices above then you will almost certainly be safe.

It is important to note that some of the security patches that have been released may deliver a performance hit to your device. This is a widespread complaint and many of the operating system vendors recognize this as an issue.

They have stated that the performance hit should not be noticeable to the average user, however, hits to performance are “highly variable and depend on a number of factors”.

If you feel like your device performance has been significantly affected, do some research on whichever update you just installed. Other people may have suggestions and/or the vendor themselves may recognize a compatibility issue with certain device setups.
 

Conclusion

The shock release of these two huge vulnerabilities should be a wakeup call to the entire world.

It is increasingly important in this day and age to be ever vigilant about what information you store on your devices.

More importantly, users and companies should focus on preventative practices, such as being aware of potential malware that could expose devices to cybercriminals.
For more advice on what users should look out for in 2018, check our article – Internet security threats to look out for in 2018

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Internet Security

Obasanjo: Nigeria’s Insecurity Has Been Weaponised 

AFRICAN EXAMINER) – Former President Olusegun Obasanjo has described Nigeria’s prolonged fight against Boko Haram as an “industry,” noting that the insurgency has lasted far longer than the country’s 1967–1970 civil war. Obasanjo made the remarks on Sunday during the Toyin Falola Interviews, a conversation livestreamed on social media…

AFRICAN EXAMINER) – Former President Olusegun Obasanjo has described Nigeria’s prolonged fight against Boko Haram as an “industry,” noting that the insurgency has lasted far longer than the country’s 1967–1970 civil war. Obasanjo made the remarks on Sunday during the Toyin Falola Interviews, a conversation livestreamed on social media…
Read More

Continue Reading
Android

Rumble adds Bitcoin wallet integration for streaming tips

Rumble begins testing a non custodial wallet that lets Android users send Bitcoin and stablecoin tips to creators. The post Rumble adds Bitcoin wallet integration for streaming tips appeared first on Crypto Briefing…

Rumble begins testing a non custodial wallet that lets Android users send Bitcoin and stablecoin tips to creators.
The post Rumble adds Bitcoin wallet integration for streaming tips appeared first on Crypto Briefing…
Read More

Continue Reading
Internet Security

GTA responds to viral video alleging kidnap and extortion of visiting Black Americans

The Ghana Tourism Authority (GTA) has responded to a video circulating on social media in which some visiting Black Americans claim they were kidnapped and extorted by individuals believed to be police officers. In a statement, the Authority explained that the Ghana Police Service and the Cyber Security Authority have begun full investigations into the

The Ghana Tourism Authority (GTA) has responded to a video circulating on social media in which some visiting Black Americans claim they were kidnapped and extorted by individuals believed to be police officers. In a statement, the Authority explained that the Ghana Police Service and the Cyber Security Authority have begun full investigations into the …
The post GTA responds to viral video alleging kidnap and extortion of visiting Black Americans appeared first on Ghanaian Times…
Read More

Continue Reading
Internet Security

Mono Protocol presale updates: how blockchain usability and chain abstraction are redefining Web3 crypto presales

Mono Protocol steps into this environment with solutions designed to reduce friction and make multi-chain activity easier. Mono Protocol recently passed its full smart contract audit with CertiK, a widely respected blockchain security firm. The Mono Protocol presale continues to see strong participation, bringing the total raised to $3.75M so far. Many users still struggle


  • Mono Protocol steps into this environment with solutions designed to reduce friction and make multi-chain activity easier.
  • Mono Protocol recently passed its full smart contract audit with CertiK, a widely respected blockchain security firm.
  • The Mono Protocol presale continues to see strong participation, bringing the total raised to $3.75M so far.

Many users still struggle with the complexity of blockchain transactions, cross-chain tools, and fragmented web3 experiences.

These challenges affect adoption across the wider crypto presale space and limit how people interact with DeFi platforms.

As demand rises, users look for the next potential big presale crypto that solves these everyday issues.

Mono Protocol steps into this environment with solutions designed to reduce friction and make multi-chain activity easier.

Interest in the presale crypto stage has continued to grow as the project gains visibility across the crypto presale list and broader cryptocurrency presale discussions.

Blockchain usability and chain abstraction are redefining Web3

The shift toward better usability is becoming essential across the top presale crypto market.

Many teams building in blockchain face similar issues: complex infrastructure, confusing routing, and high development costs.

Mono tackles these challenges by offering tools that let developers build apps that just work.

This direction supports the growing interest in new crypto presale platforms focused on function instead of noise.

Developers save time and reduce expenses because they no longer need to build cross-chain infrastructure from scratch.

The system manages routing and execution so teams can focus on product design and quicker shipping.

This aligns with trends seen across crypto ICO presale discussions as builders aim to create smoother user experiences.

Mono also introduces transaction fee configuration, helping teams generate revenue while offering users dependable execution and MEV protection.

As web3 adoption grows, this type of clean, reliable process supports the rise of strong presale ICO projects and helps shape what the community expects from a next potential big presale crypto.

Rewards hub that simplifies earning in the crypto presale journey

Mono’s Rewards Hub acts as the central space where users complete tasks during the presale crypto stage.

It includes social quests, referral steps, and presale challenges that reward participants with promo codes.

These codes can be redeemed for bonus MONO once connected through a supported wallet, giving users a simple path to engage with the presale process.

The clear structure helps new users navigate web3 interactions without confusion.

By making each step easy to follow, the system supports growth across cryptocurrency presales and gives users an active role in the process.

This approach has made Mono stand out among crypto presale projects that aim to streamline participation.

As users complete quests and claim their promo codes, bonuses are delivered directly as MONO.

This strengthens involvement within the top presale crypto market and shows how clean design can improve presale experience across the broader blockchain ecosystem.

CertiK audit complete

Mono Protocol recently passed its full smart contract audit with CertiK, a widely re

Read More

Continue Reading