Vulnerability Warning

Created at November 18, 2018

Vulnerability Warning: Intel CPU

By now you may have heard about the ‘Intel CPU Vulnerability’ and may have even started to receive emails from your Antivirus vendor with information regarding patching. This latest vulnerability is also commonly known as ‘Meltdown’.

Meltdown breaks the most fundamental isolation between user applications and the operating system. This vulnerability allows a program to access the memory, and thus also the secrets, of other programs and the operating system. Meltdown affects personal computers, mobile devices, servers, and cloud systems.

Meltdown breaks the most fundamental isolation between user applications and the operating system. This vulnerability allows a program to access the memory, and thus also the secrets, of other programs and the operating system. Meltdown affects personal computers, mobile devices, servers, and cloud systems.

If your computer has a vulnerable processor and runs an un-patched operating system, it is not safe to work with sensitive information without the chance of leaking the information. Luckily, there are software patches being released by Microsoft, Apple, and Linux providers to repair the vulnerability.

Meltdown uses similar techniques to many modern Antivirus programs. As such, patching the vulnerability may cause issues with system stability and Antivirus functionality. We will work with our vendors to identify, update, and patch relevant Antivirus products to then enable patching of affected operating systems.

“We are committed to patching all affected systems as quickly as possible. We continue to work closely with our vendors to monitor and protect our customers.”

Michael Strong, COO

For more information about the details of the vulnerability, visit the public information site at https://spectreattack.com/. If you have any questions or inquiries, please contact us.

  • What You Need to Know About Two Factor Authentication

    In the world of cyber and digital crime, internet security is becoming more prevalent in our lives. Although regularly changing your passwords and complicating their text seems secure, a simple phishing tactic can change all that. Enter, two factor authentication, also known as TFA or 2FA. 2FA will not only require...