Brands
Discover
Events
Newsletter
More

Follow Us

twitterfacebookinstagramyoutube
Youtstory

Brands

Resources

Stories

General

In-Depth

Announcement

Reports

News

Funding

Startup Sectors

Women in tech

Sportstech

Agritech

E-Commerce

Education

Lifestyle

Entertainment

Art & Culture

Travel & Leisure

Curtain Raiser

Wine and Food

YSTV

ADVERTISEMENT
Advertise with us

Patch fast to avoid chip security flaw if on Cloud: Experts

Patch fast to avoid chip security flaw if on Cloud: Experts

Friday January 05, 2018 , 2 min Read

With chip giant Intel confirming a potential security flaw in its chips that is vulnerable to hacking, cyber security experts on Thursday advised enterprises running businesses on Cloud to install available security patches without delay.

Computer security experts have discovered two major security flaws in chips. One is called "Meltdown" that impacts only Intel chips while the other called "Spectre" affects all chips, including ARM and AMD.

It's a fairly major vulnerability and allows a malware to read memory of other processes.

"As they are hardware bugs, patching is a significant job. Patches against 'Meltdown' have been issued for Linux, Windows and OS X and work is underway to strengthen software against future exploitation of 'Spectre,'" said Senior Security Researchers Ido Naor and Jornt van der Wiel from Kaspersky Lab's Global Research and Analysis Team (GreAT).

Intel has a tool people can use to check if their systems are vulnerable to the bugs.

"It is vital that users install any available patches without delay. It will take time for attackers to figure out how to exploit the vulnerabilities — providing a small but critical window for protection," the experts advised.

Microsoft on Thursday issued emergency updates to supported versions of Windows.

Intel said it was working with its tech partners such as AMD, ARM Holdings and several operating system vendors to develop an industry-wide approach to resolve this issue "promptly and constructively".

"This issue represents a higher risk in Cloud environments because it would be easy to create an AWS or Microsoft Azure account, start a new instance and then run the exploit to dump memory of the server which would be hosting many other instances of other customers," said K.K. Mookhey, CEO and Founder of Network Intelligence, a cyber security consulting firm.

Patches from most major software manufacturers have become available for "Meltdown". Most Cloud service providers have also rolled out patches and issued advisories.

"For the enterprise customers who are not on the Cloud, this issue isn't going to bring the skies crashing down as it's not remotely exploitable. So launching the attack would first require compromising the network and systems using some other means of attack," Mookhey noted.