Skip to main content

Week 4 Blog: Meltdown and Spectre

Recently, four different teams of researchers found significant vulnerabilities which affect nearly all computers, Windows and Macs, iPhone, and iPad. This gap has to do with what is called "speculative execution" (Peter Bright, 2018) by the processor within the machine. What speculative execution is the processor trying to "maximize performance, they try to execute instructions even before it is certain that those instructions need to be executed. (Peter Bright, 2018)" How this present a security gap is it allows potentially malicious code to see these instructions before they are needed. Additionally, the code can bypass any security checks due to the fact it is trying to queue the instructions before it really needs to execute it.
As mentioned before, this vulnerability has affected all major computer and smartphone companies. They have all responded in various ways. Intel which is the company most impacted by this discovery has recommended operations system fix in order to remediate this situation. Microsoft has a variety of fixes since this was disclosed to them back in the fall of 2017, which are out or will be coming out soon. Apple has announced all current machines and devices as long as they are up to date on the patches are safe.
To be clear, I selected some of the more recognizable brand names who are having to deal with this situation. This is affecting everyone. Major processors manufacturers such AMD and ARM, who compete with Intel, are having to figure this out as well. Two well-written articles I would recommend are "Meltdown and Spectre: Here’s what Intel, Apple, Microsoft, others are doing about it" on the Ars Technica site and "Triple Meltdown: How so Many Researchers found a 20-year-old chip Flaw at the Same Time" on Wired site. We'll continue to write about this as more information is released.


Research

Greenberg, A. (2018, January 07). How So Many Researchers Found a 20-Year-Old Chip Flaw At Once. Retrieved January 07, 2018, from https://www.wired.com/story/meltdown-spectre-bug-collision-intel-chip-flaw-discovery/


Peter Bright - Jan 5, 2018 1:52 pm UTC. (2018, January 05). Meltdown and Spectre: Here’s what Intel, Apple, Microsoft, others are doing about it. Retrieved January 07, 2018, from https://arstechnica.com/gadgets/2018/01/meltdown-and-spectre-heres-what-intel-apple-microsoft-others-are-doing-about-it/

Comments

Popular posts from this blog

Week 6: Spectre and Meltdown Fallout Continues.

By this time, many of you have heard about the Spectre and Meltdown vulnerabilities of which a lot of machines are susceptible. Most of the major parties involved have provided fixes through various patching means. However, there is still significant fallout due to this gap. Intel is now reporting their firmware patch is causing updates on some of the new chips they have produced. "Firmware updates were causing problems with Ivy Bridge, Sandy Bridge, Skylake and Kaby Lake." (Schwartz, 2018) This flaw is causing frequent reboots and instability in those chips. Additionally, Intel is behind in getting their firmware updates to the various vendors. Some of the major brands which are affected by these gaps are still feeling their way around this and trying to ensure they patch appropriately. It is likely we will see higher than normal OS updates for most folks when it comes to their computers, tablets, and smartphones. However, the big concern and part of the reason this g...

Week 2 Blog: Apple's Recent Software Security Issues

Recently, my favorite tech company has been in the news for some very significant security gaps in their applications. Apple has long been branded as very secure software. Frequently, people will say they just don't get a virus. However, there was a security gap that impacted the Macs, which were using their latest software - High Sierra. This vulnerability allowed root access to any machine running this software. Various sites such as "The Verge" indicate using root to access these machines allow elevated privileges on the machine. It could be used to change Apple ID emails as well as user passwords. The gap presented a huge dent in Apple's reputation on security. Part of it was the way it was announced- the person who discovered the vulnerability publicly disclosed it on twitter. Interesting enough, Apple has a bug detection program in which they pay for any gaps in their software. Even more recently, a new vulnerability was discovered in Apple's Home Kit...

What is leadership anyways?

Security Leadership is what precisely? I ask the question because it is a concept I am wrestling with at this time. What does it mean to be a security leader? Is it merely leading a security department as an information security manager or at the enterprise level as a chief information security officer or chief security officer? Is it influencing an organization's security posture without having an official title? Ultimately, leadership is about people. They said leadership is about getting people to work toward a common goal. The question is, are folks in those roles business leaders who are leading a technical portfolio, or are they technical leaders who enable the business to accomplish their goals? It is likely security leaders are both, and often need to be both. They're technical leaders and business leaders. However, they require different leadership skills to be successful. The additional factor is what is the senior leadership need from their senior security...