San Francisco Chronicle

Keeping computers safe from chip flaws

- By Cade Metz and Brian X. Chen

Now that experts have revealed two security flaws that affect nearly all microproce­ssors — potentiall­y allowing hackers to lift passwords, photos, documents and other data from smartphone­s, PCs and cloud computing services — what should you do about it?

Some of the world’s largest tech companies have been working on fixes for these problems, called Meltdown and Spectre. But the researcher­s who discovered the flaws said that Spectre is not completely fixable. “It is a fundamenta­l flaw in the way processors have been built over the last decades,” said Paul Kocher, one of the researcher­s who discovered these flaws.

Here is a guide to what you need to know and what you should do. Where exactly are these flaws? Both are issues with the way computer chips are designed.

Meltdown affects most processors made by Intel, the company that supplies chips for a majority of PCs and more than 90 percent of computer servers.

Spectre is far more difficult for hackers to exploit. But it is even more pervasive, affecting Intel chips, microproce­ssors from longtime Intel rival AMD and the many chips that use designs from British company ARM. Your smartphone most likely contains an ARM chip. Why are they such a problem? Both flaws provide hackers with a way of stealing sensitive data, including passwords. If hackers manage to get software running on one of these chips, they can grab data from other software running on the same machine.

This is a particular issue on cloud computing services. Why are cloud computing services so important? Operated by companies like Amazon, Microsoft and Google, these services let any business or individual rent access to computing power over the Internet. On a cloud service, each server is typically shared by many different customers. By exploiting the Meltdown flaw, a hacker can just load some software onto a cloud service and then grab data from anyone else who has loaded software onto the same server. What about phones and PCs? Phones and PCs are more difficult targets. Before they can exploit the flaws, hackers must find a way of getting their software onto your device. They could fool you into downloadin­g an app or could trick you into visiting a website that moves code onto your machine. But companies are fixing these flaws? They are trying. Meltdown can be fixed by installing a software patch on the machine. Microsoft has released one for Windows PCs. Apple said it had released patches for iOS, Macs and the Apple TV that help mitigate the issue. Intel is also working on updates to help fix the problem.

The onus is now on consumers and businesses to install the fix on their machines. What should I do as a consumer? Keep your software up to date. That includes your operating system and apps like your Web browser and antivirus software. Microsoft, Mozilla and Google have already released patches for Internet Explorer, Firefox and Chrome to help address the problem.

Installing an ad blocker on your browser is also a safeguard, according to security experts. Even the largest websites do not have tight control over the ads that appear on their sites — sometimes malicious code can appear inside their ad networks. A popular ad blocker among security researcher­s is uBlock Origin.

“The real problem is ads are dangerous,” said Jeremiah Grossman, the head of security strategy for SentinelOn­e, a computer security company. “They’re fully functionin­g programs, and they carry malware.” How do I update my software? Your operating system and apps typically have a button you can click to check for software updates. For example, in Google’s Chrome browser on a computer, you can click on the three dots in the upper-right corner and click Update Google Chrome. To update Windows, click the Start button and click through these buttons: Settings, Update & security, Windows Update and Check for updates. To update the Mac system, open the App Store app and check the Updates tab for the latest software.

Don’t procrastin­ate. Last year, a piece of malware called WannaCry infected hundreds of thousands of Windows machines worldwide. Microsoft had released an update before the attack, but many machines were behind on downloadin­g the latest security updates.

What about the cloud services? Amazon, Google and Microsoft said that they had already patched most of the servers that underpin their cloud computing services, and that largely addresses the problem. But Amazon and Google also said customers might need to make additional changes.

To share computing power with customers, cloud services offer “virtual machines.” These are computers that exist only in digital form. Customers use these virtual machines to run their own software. After Amazon, Google and Microsoft update their machines, customers may have to update the operating systems running on their own virtual machines to guard against some exploits.

If everybody updates his or her software, all is good? No. The researcher­s who discovered Meltdown said that patching systems would slow them down by as much as 30 percent in certain situations. That could be a problem for big cloud systems.

Independen­t software developers also ran tests on a patched version of Linux, the open-source operating system that now drives more than 30 percent of the world’s servers, and saw similar slowdowns.

“There are many cases where the performanc­e impact is zero,” said Andres Frome, a software developer who has tested the new code. “But if you are running something like a payment system, where a lot of small changes are made to data, it looks like there will be a significan­t performanc­e impact.”

Consumers are less likely to be affected, and Kocher said slowdowns could dissipate over time as companies refined their patches. What about the Spectre flaw? According to the researcher­s who discovered these flaws, including security experts at Google, the memory chip maker Rambus and various academic institutio­ns, Spectre can’t be completely fixed. But patches can solve the problems in some situations. Intel and Microsoft and others said the same. Spectre can’t be fixed? No, according to the researcher­s. But Spectre is much more difficult than Meltdown for hackers to exploit.

Similar to Meltdown, Spectre can steal informatio­n from one applicatio­n and share it with another. For example, an app you download from the Web could steal informatio­n like passwords from other software on a computer.

On Wednesday, the Department of Homeland Security issued an alert that said the only solution to the threats posed by Meltdown and Spectre would be a full replacemen­t of the chips. But that does not seem feasible, given how many machines are involved. “Spectre is going to be with us a lot longer,” Kocher said.

An Intel vice president, Donald Parker, is adamant that the company’s chips will not need to be replaced. He said that with software patches and “firmware updates” — a way of updating code on the chip itself — Intel and other companies could “mitigate the issues.”

 ?? Jim Wilson / New York Times 2016 ?? Paul Kocher (left) moderates a computer security conference in San Francisco in March 2016. Kocher is one of the researcher­s who discovered the microproce­ssor flaws.
Jim Wilson / New York Times 2016 Paul Kocher (left) moderates a computer security conference in San Francisco in March 2016. Kocher is one of the researcher­s who discovered the microproce­ssor flaws.

Newspapers in English

Newspapers from United States