1447 year 18 Рамазон | 2026 year 07 march, saturday
Regions:
ЎЗ UZ RU EN
Articles

Why your smartphone and laptop are at risk

17:33 / 28.09.2019 1290 Reading mode + -

Researchers have identified a security flaw in the computer processors made by three of the world’s biggest chip designers, Intel, AMD and ARM, and the second flaw in Intel chips. This means that almost every smartphone, tablet, laptop and business computer in the world could be vulnerable to having sensitive data including passwords stolen. The cloud servers that store websites and other internet data are also at risk.

This is one of the biggest cybersecurity vulnerabilities we’re ever seen in terms of the potential impact on personal, business and infrastructure computer systems. What’s more, because the flaw is located in such a fundamental part of the computer, there’s no way to know whether or not a machine has been targeted and what data might have been accessed.

Both the main flaw (Spectre), and the Intel-only flaw (Meltdown) have been created by a design technique intended to enhance the chips’ performance known as “speculative execution”. The problem means hackers can access parts of the computer’s memory that should be inaccessible. Sensitive data including passwords, email, documents, and photos could all be at risk.

Most cyber-attacks involve finding a flaw in a computer’s software that allows hackers to access the machine’s memory or operating system. For example, in 2017 an attack known as “WannaCry” exploited a flaw in older versions of Windows. It affected around 300,000 computers in 150 countries and had a devastating effect on businesses and organizations including the UK’s National Health Service (NHS).

But the Spectre and Meltdown flaws could let hackers cut through all the layers of software to violate the very heart of a computer, the processor chip that powers its fundamental workings. Because similar designs are used by all the major chip makers, almost every computer in the world could be affected, from Apple iPhones and Android devices to MacBooks, large desktop PCs, and internet servers.

The process is also so fundamental that it doesn’t create any log of its operations, meaning there is no record of whether a particular chip has been hacked or not. This makes it harder to spot cyber attacks at an early stage in order to prevent them from happening again or to investigate what data might have been accessed or stolen.

Luckily, tech companies have already begun releasing software patches that they say will solve the problems without a significant impact on performance. But some have claimed any fix could dramatically slow down computer processing speed. We will have to wait to see the long-term impact.

In the past, this debate has forced tech companies to use the law to prevent researchers from disclosing security problems. For example, scientists from the University of Birmingham faced a legal injunction from car manufacturer Volkswagen stopping them publishing details of flaws in car keyless entry systems.

The preferred route is “responsible disclosure”. When researchers discover a problem, they tell a small number of relevant people who can then work on a solution. The manufacturer can then reveal the problem to the public once the solution is ready, minimizing the potential for hacking and damage to the company’s share price.

In this case, a researcher at Google who found the flaws seems to have alerted Intel in June 2017, and the two companies had been planning on announcing a fix. But details of the flaw were then published by technology website The Register, forcing the firms to reveal what they knew earlier than planned and hitting Intel’s share price. While this kind of revelation arguably undermines responsible disclosure, the counter-argument is that it forces manufacturers to fix the problem faster.

Related articles
Stop waiting for YOUR life to changeYou`re responsible for YOUR life.No matter how long you wait, nobody is going to walkup to you and hand you a great life. Nobody is going to face your fears and conquer your doubts so that you can start experiencing the power of the potential you were born more...

1078 16:49 / 18.05.2020
Isolated academic views are the results of a person being void of two characteristics Studying knowledge by teachers tutorship and gradual acquisition of knowledge.

1217 13:58 / 10.01.2020
`` O you who believe Whoever of you goes back from his religionmdashAllah will bring a people whom He loves and who love Him, kind towards the believers, stern with the disbelievers. They strive in the way of Allah, and do not fear the blame of the critic. That is the grace of Allah He bestows it more...

2749 18:04 / 05.09.2019
Tashkent, Uzbekistan Located over 80 hectares 198 acres of land in the centre of Uzbekistanaposs capital, quotTashkent Cityquot, a stateled flagship project, marks a new beginning in the countryaposs history.It includes a skyhigh, glassclad Hilton hotel, manicured green lawns leading to an more...

3139 16:42 / 08.11.2019
Tazkiya
HADITH OF THE DAY
Anas ibn Malik radiallahu anhu reported Allahaposs Messenger peace be upon him having said on the day of Nahr SacrificeHe who slaughtered the animal as a sacrifice before the aposId prayer, should repeat it i. e. offer another animal. Thereupon a person stood up and said Messenger of Allah, that is more...