Installing security patches is usually such a humdrum task that even the most inexperienced users handle it. Unfortunately, that has not been the case with the Spectre and Meltdown fixes. This time around, we recommend you skip installing the update and let an IT professional handle it for you.
The post Beware of the Meltdown and Spectre patches appeared first on Complete Technology Resources, Inc..
Installing security patches is usually such a humdrum task that even the most inexperienced users handle it. Unfortunately, that has not been the case with the Spectre and Meltdown fixes. This time around, we recommend you skip installing the update and let an IT professional handle it for you.
Unsecured data storage
Spectre and Meltdown are the names given to two hardware flaws that allow hackers to see any piece of information stored on your computer. Although slightly different in execution, both take advantage of a hardware feature that computer chips use to access and store private information. For the last 20 years, security experts believed this information could not be stolen or spied on by malicious software, but that assumption was proven false on January 3, 2018.
Now that the Spectre and Meltdown vulnerabilities are public information, hackers can use them to create programs that steal passwords, social security numbers, credit card numbers, and anything else you type into your computer.
Because these problems are hardware-based, none of the updates will be able to secure the vulnerable storage; they’ll simply prevent your computer from storing anything in it. Currently, there are patches for:
- Operating systems (Windows, macOS, and Linux)
- Web browsers (Chrome, Firefox, Safari, Edge, and IE)
- Chip firmware (low-level programs installed on the processor itself)
If you’re using an Apple computer, these updates are relatively easy to install. If you’re using a Windows or Linux-based computer, these patches may cause your machine to freeze, reboot unexpectedly, or significantly slow down.
Why should I wait to install the updates?
Intel, one of the chipmakers responsible for the Spectre and Meltdown flaws, has provided contradictory recommendations on more than one occasion. As recently as January 18, Intel recommended waiting for an updated patch, but in the same announcement also recommended “consumers to keep systems up-to-date.”
Experts believe detecting an attack that is based on one of these flaws will be relatively easy and represent an alternative to installing updates that could render your computer unusable.
What should I do?
IT support experts will be able to quickly and easily assess what is the best option for your computers. For example, our team can determine whether or not your hardware will conflict with the current patches, and either install them or set up a detection strategy that will help you mitigate the risks without ruining your computer.
If you need expert IT support for quick responses and ironclad security -- give us a call today.
The post Beware of the Meltdown and Spectre patches appeared first on Complete Technology Resources, Inc..