There certainly is a lot of news these days regarding cyber attacks and data breaches. Very recently, Bell Canada experienced a breach that has impacted up to 100,000 customers. It is estimated that hackers had access to Bell cyber security personal information such as names, phone numbers and email addresses. Fortunately, it is thought that banking information was not compromised.
Data that is normally inaccessible may now be able to be obtained by hackers after discovering security flaws. Specifically, it has come to light that there are two security flaws named Spectre and Meltdown that are being found in most modern processors. As processors are literally in every device, this opens up the risk for a hack of information from personal computers, mobile devices, servers, and cloud services.
Experts revealed that since these flaws are design based, they will be more difficult to fix. Software patches have been released to temporarily fix operating issues to combat Meltdown and Spectre. However, the fixes are causing systems to slow down, impeding their ability to operate regularly.
These flaws are not new by any means and have been present for years. However, some researchers believe that these flaws can be specific to certain manufacturers. Regardless, here is some information that you should know about Meltdown and Spectre:
• A device’s data can be accessed by breaking down the barriers of security between an operating system and a device’s applications. Data that is shared across multiple users are also at risk. Updates have been released by software developers to mitigate the potential for hackers to use Meltdown and exploit users.
• Similar to Meltdown, this flaw focuses on the vulnerability of device’s applications as a means to access sensitive data, which includes documents, photos, and passwords. Computer systems, smartphones, and servers are all subject to the threat of Spectre since it is present in ARM, AMD and Intel processors which are most commonly used. The redesign of future processors may be the key to overcoming the vulnerability issues present in today’s processors.