
If you've been on the Internet for the past few days, you've probably come across the terms "gong" and "ghost" in some troubling headlines. Both are hardware-level gains affecting billions of computers
It could allow attackers to gain access to your sensitive information. But through the media frenzy in the wake of their discovery, it's easy to get lost. Press the arrow right to find out 5 things you need to know, and how to help protect computers and data
What is the avalanche ghost?
Simply put, crash and stealth are the names of two recently discovered security vulnerabilities within a wide variety of computers. Everyone who exploits the use of similar basic concepts by exploring the architecture at the core of all modern computing systems. It's not a faint reading, but secretarial researchers have published two white papers on exploits
The two exploits are similar but separate. The crash is a vulnerability that, for the most part, only affects Intel processors - but it's dangerous for users dealing with sensitive information on unprotected systems.
Specter, on the other hand, can affect basically any modern computer system. This last vulnerability is both difficult to exploit and harder to protect against, so it can be spread across most web browsers.
What things are in danger?
Stealth and Breakdown both benefit from speculative execution mechanisms on the CPU. In other words, they are hardware-based defects and the exploitation of mechanisms and design decisions in computers that were intentional. Both fatalities are extremely dangerous, leaving billions of devices at risk.
The crash, which affects Intel CPUs, could allow malicious programs to read kernel memory. This could allow attackers access to sensitive data such as passwords, documents, pictures, and emails.
Specter, which includes two exploit technologies, breaks the isolation between different applications on a computer. While it is a little difficult to pull off, Apple said that it can be tapped via JavaScript in a web browser.
Which devices are affected?
The crash affects devices with Intel processors. Specter is widespread and, in theory, can be used as an exploit based on any modern computer processor. But the danger does not stop at Macs and computers.
Apple has claimed that the crash could affect iOS and TFSOs, too (although WhatsApp devices appear to be safe at this point).
If your computer is using a weak processor and running an operating system that is not installed by the operating system, it is at risk. The threat can also affect cloud infrastructure, systems using weak processors, and OS versions.
Safe to say, this bug affects millions of systems. However, directly, either exploit will not pose any greater risk to users who practice safe computing than other dangerous viruses, Slate points out.
How are Apple and others
One of the primary issues with Specter and Multon is that they exploit design decisions taken to increase computer performance. Simply put, the way we design computer processors allows for these exploits. And, in turn, an attempt to fix exploits could very well result in slower performance on a wide range of devices.
And while most of the major electronics makers - including Intel and Apple - are already releasing software updates and patches to mitigate vulnerabilities, the effects could be widespread. In fact, both exploits could change the way companies design future processors and other computers. For security researchers and technology companies alike, there is a great deal of work ahead.
What we do
First of all, the best advice is to find out if the operating systems that use patches are updated to mitigate their exploits. Most systems - including upcoming Safari and Chrome patches to be released by Apple and Google that can reduce the risk of Specter exploit.
Some government cybersecurity officials fear that the latest software patches are not sufficient, and that low-level firmware updates may be required.
It's also smart to practice safe computing strategies in all of your electronic work - including standard advice on avoiding computer viruses. Antivirus software is already updated to scan for viruses that use exploitations (even update them when you can).
Additionally, refrain from saving any passwords in the browser or cache, and be careful about the sites and services you use.
Comments
Post a Comment