Business World

Businesses cautious in installing patches to fix microchip flaw

-

SAN FRANCISCO — Chances that a fix to a major microchip security flaw may slow down or crash some computer systems are leading some businesses to hold off installing software patches, fearing the cure may be worse than the original problem.

Researcher­s last week revealed security problems with chips from Intel Corp. and many of its rivals, sending businesses, government­s and consumers scrambling to understand the extent of the threat and the cost of fixes.

Rather than rushing to put on patches, a costly and timeintens­ive endeavor for major systems, some businesses are testing the fix, leaving their machines vulnerable.

“If you start applying patches across your whole fleet without doing proper testing, you could cause systems to crash, essentiall­y putting all of your employees out of work,” said Ben Johnson, co- founder of cybersecur­ity start-up Obsidian.

Banks and other financial institutio­ns spent much of the week studying the vulnerabil­ities, said Greg Temm, chief informatio­n risk officer with the Financial Services Informatio­n Sharing and Analysis Center, an industry group that shares data on emerging cyber threats.

The flaws affect virtually all computers and mobile devices, but are not considered “critical” because there is no evidence that hackers have figured out how to exploit them, said Mr. Temm, whose group works with many of the world’s largest banks.

“It’s like getting a diagnosis of high blood pressure, but not having a cardiac arrest,” Mr. Temm said. “We’re taking it seriously, but it’s not something that is killing us.”

Banks are testing the patches to see if they slow operations and, if so, what changes need to be made, Mr. Temm said. For instance, computers could be added to networks to make up for the lack of processor speed in individual machines, he added.

Some popular antivirus software programs are incompatib­le with the software updates, causing desktop and laptop computers to freeze up and show a “blue screen of death,” researcher Mr. Johnson said.

Antivirus software makers responded by rolling out fixes to make their products compatible with the updated operating systems, he said. In a blog posting on Friday, Microsoft Corp. said it would only offer security patches to Windows customers whose antivirus software suppliers had confirmed with Microsoft that the patch would not crash the customer’s machine.

“If you have not been offered the security update, you may be running incompatib­le antivirus software, and you should consult the software vendor,” Microsoft advised in the blog post.

Government agencies also are watching. The Ohio Attorney General’s office is monitoring the situation, a spokesman said by email.

“Intel continues to believe that the performanc­e impact of these updates is highly workload dependent and, for the average computer user, should not be significan­t and will be mitigated over time,” the world’s no. 1 chipmaker said on Thursday in a release.

It cited Amazon. com, Inc., Apple, Inc., Alphabet, Inc.’s and Microsoft as saying that most users had seen no significan­t impact on performanc­e after installing the patches.

The cloud vendors are among a group of firms that quickly patched their technology to mitigate against the threat from one of those vulnerabil­ities, dubbed Meltdown, which only affects machines running Intel chips.

Major software makers have not issued patches to protect against the second vulnerabil­ity, dubbed Spectre, which affects nearly all computer chips made in the last decade, including those from Intel, Advanced Micro Devices, Inc. ( AMD) and ARMarchite­cture manufactur­ers, including Qualcomm, Inc.

However, Google, Firefox and Microsoft have implemente­d measures in most web browsers to stop hackers from launching remote attacks using Spectre.

Government­s and security experts say they have seen no cyber attacks seeking to exploit either vulnerabil­ity, though they expect attempts by hackers as they digest technical data about the security flaws.

One key risk is that hackers will develop code that can infect the personal computers of people visiting malicious websites, said Chris Wysopal, chief technology officer of cyber security firm Veracode.

He advised PC owners to install the patches to protect against such potential attacks. Computer servers at large enterprise­s are less at risk, he said, because those systems are not used to surf the Web and can only be infected in a Meltdown attack if a hacker has already breached that network.

Microsoft has issued a patch for its Windows operating system, and Apple desktop users with the most recent operating system are protected. Google has said most of its Chromebook laptops are already protected and that the rest would be soon.

Apple said it planned to release a patch to its Safari Web browser within coming days to protect Mac and iOS users from Spectre.

While third- party browsers from Google and others can protect Mac users from Spectre, all major Web browsers for Apple’s iOS devices depend on receiving a patch from Apple. Until then, hundreds of millions of iPhone and iPad users will be exposed to potential Spectre attacks while browsing the Web. —

Newspapers in English

Newspapers from Philippines