Chip Design Flaw Not Limited to Intel, Researchers Say

  • Chip Design Flaw Not Limited to Intel, Researchers Say

Chip Design Flaw Not Limited to Intel, Researchers Say

Intel claims to have already nipped this whole Meltdown and Spectre security hole problem in the bud, according to its latest press release on the matter.

'By the end of next week, Intel expects to have issued updates for more than 90 percent of processor products introduced within the past five years'.

It advised only getting apps from its online App Store which vets programs for safety, and said it has already released some "mitigations" to protect against the exploit and planned to release a defensive update for Safari on macOS and iOS in the coming days.

To proceed with the claims, plaintiffs will need to establish that Intel misled consumers and prove damage resulting from the bugs, like performance slowdowns or cyberattacks.

But the attacks do live up to their ominous names, because even if you were compromised, researchers said you likely wouldn't even know it. In addition, the heat on Intel intensified after it was learned that its CEO, Bryan Krzanich, sold off millions of dollars of Intel stock after the disclosure.

"This is not an issue that is not fixable", Krzanich said in an interview Thursday.

With regards to the performance impact of the fixes for these vulnerabilities, again Intel is citing what it believes are exaggerated reports.

Technology companies are working to protect their customers after researchers revealed that major security flaws affecting almost every modern computer processor could allow hackers to steal stored data - including passwords and other sensitive information - on desktops, laptops, mobile phones and cloud networks around the globe. That means passwords, photos, and other content could be accessed by hackers. While on some discrete workloads the performance impact from the software updates may initially be higher, additional post-deployment identification, testing and improvement of the software updates should mitigate that effect.

Media reports have suggesting a significant performance impact from some of the updates.

Yes, the company is talking about mitigating the mitigation. Both Meltdown and Spectre can essentially erode the boundaries in a machine that seperate one client's data from another. ARM has put out a security briefing note, indicating which chips could have been affected by Spectre.

A design flaw was found in Intel's microprocessors, causing a "redesign" of Linux and Windows kernels to get rid of the "chip-level security bug", reports The Register. The trade-off is that these fixes are expected to slow computers down by as much as 30%.

Originally, CERT/CC, a cybersecurity team with close ties to the United States government, said the only guaranteed way to mitigate the threat of Spectre was to replace all of the affected processors with updated ones.