Martes, 22 Enero 2019
Ultimas noticias
Casa » What You Should Know About Meltdown and Spectre — Special Report

What You Should Know About Meltdown and Spectre — Special Report

13 Enero 2018

REUTERS/Choi Dae-woongSecurity flaws Meltdown and Spectre affect processors made in the last 20 years.

Read AMD's full release here. In the meantime, fans are advised to value and keep caution until the problem has been completely eradicated.

Of course, there was only one little problem with this fix: The first Microsoft Windows 10 patch bricked some PCs running older AMD processors.

Microsoft's OS-level patch for the issue appeared to cause more harm than good, however, causing Microsoft to pull it from distribution. Browsers can be used to exploit these vulnerabilities. We will then focus on issuing updates for older products as prioritized by our customers. He says the company will "provide frequent progress reports of patch progress, performance data and other information". The shorts who dumped their shares before January 2 left a lot of cash on the table.

However it is reported in various media outlets that some organisations such as Epic Games, have publicly complained about the Meltdown patches impacting performance.

Meltdown and Spectre have been discovered in computer chips in billions of computers, smartphone and tablets across the world. The following day, CERT deleted its statement, instead providing consumers with a list of vendors that have updated their software to help guard against Meltdown and Spectre. For the latest details, please see Microsoft's website. As Google explained it, there are three variants here.

Well, the panic receded and companies and researchers got to work on software fixes that will mostly (but not fully) address the issue. In addition, the company intends to increase funding for academic and independent research of security threats.

AMD will make optional microcode updates available to our customers and partners for Ryzen and EPYC processors starting this week. Older CPUs will receive them over the coming weeks.

Intel has pledged to further transparency, whilst altering its guidance on performance issues around security fixes, after recent revelations of two major CPU security flaws. The situation is still developing, but Spanning is proactively working to ensure customer data is protected.

GPZ Variant 3 (Rogue Data Cache Load or Meltdown) is not applicable to AMD processors. This is why you want to be careful to evaluate the risk of untrusted code for each Windows Server instance, and balance the security versus performance tradeoff for your environment.

What You Should Know About Meltdown and Spectre — Special Report