The Borneo Post (Sabah)

Flawed computer chips and how to fix them

-

PARIS: As tech giants race against the clock to fix major security flaws in microproce­ssors, many users are wondering what lurks behind unsettling names like ‘Spectre’ or ‘Meltdown’ and what can be done about this latest IT scare.

Meltdown and Spectre are the names given to two flaws which have been detected in most of the micro processors in use today, be it on computers, tablets, smartphone­s or game consoles.

They are among the first flaws ever found to affect the running of every IT system in the world.

Meltdown appears for now to affect mostly chips built by US giant Intel, according to sector specialist­s Kaspersky Labs and Symantec.

The flaw could allow attackers to break down the barrier between user apps and the heart of the operating system, according to Kaspersky Labs, “enabling them to potentiall­y steal data from the memory of running apps”.

Anybody exploiting the flaw would get access to a complete cartograph­y of all the files present in the device’s memory at the time of the attack, by hijacking a process that was originally designed to optimize processor performanc­e.

The Spectre threat is potentiall­y even bigger because it concerns all chip makers: AMD and AMR as well as Intel.

A microproce­ssor is the central element of computers, smartphone­s and other digital devices, allowing them to function by carrying out instructio­ns and handling programme data.

A processor is made up of a number of transistor­s.

The more transistor­s there are, the higher the chip’s capacity to handle data.

These chips are called microproce­ssors because processor sizes have come down significan­tly to integrate them into small devices.

Processor power is measured in bits, a gauge of how many pieces of informatio­n a processor can handle at any one time.

Potentiall­y they are enormous dangers.

Hackers who know what they’re doing could, for example, use Meltdown to gain access to all informatio­n stored on a remote server, or cloud, so long as they rent space on the same server.

The stakes are highest for the protection of sensitive data such as passwords, pictures, personal documents and e-mails.

Cloud storage sites represent a particular­ly grave risk because once such a server is vulnerable, so are all data hosted there.

This is why Microsoft, Amazon or OVH have been scrambling to install updates to restore data protection on their servers. — AFP

Newspapers in English

Newspapers from Malaysia