Sumup: CPU hardware vulnerable to side-channel attacks (Meltdown, Spectre and more)

If you’re confused by the avalanche of early reports, denials, and conflicting statements about the massive security issues announced in the last days, don’t worry — you’re far from the only one. Here’s what you need to know about Meltdown and Spectre, the two huge bugs that affect practically every computer and device out there. Source of the article: Kernel panic! What are Meltdown and Spectre, the bugs affecting nearly every computer and device?   What are these flaws? Short answer: Bugs at a fundamental level that allow critical information stored deep inside computer systems to be exposed.       Meltdown Meltdown breaks the most fundamental isolation between user applications and the operating system. This attack allows a program to access the memory, and thus also the secrets, of other programs and the operating system. If your computer has a vulnerable processor and runs an unpatched operating system, it is not safe to work with sensitive information without the chance of leaking the information. This applies both to personal computers as well as cloud infrastructure. Luckily, there are software patches against Meltdown.  Meltdown Paper Spectre Spectre breaks the isolation between different applications. It allows an attacker to trick error-free programs, which…

No Image

2010 CWE/SANS Top 25 Most Dangerous Programming Errors

The 2010 CWE/SANS Top 25 Most Dangerous Programming Errors is a list of the most widespread and critical programming errors that can lead to serious software vulnerabilities. They are often easy to find, and easy to exploit. They are dangerous because they will frequently allow attackers to completely take over the software, steal data, or prevent the software from working at all. Read more here: mitre.org: http://cwe.mitre.org/top25/ PDF: http://cwe.mitre.org/top25/archive/2010/2010_cwe_sans_top25.pdf The 1st place: Failure to Preserve Web Page Structure (‘Cross-site Scripting’) The 2nd place: Sanitization of Special Elements used in an SQL Command (‘SQL Injection’) The 3rd place: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) My personal opinion: I am astonished that is ONLY on place 3. I would set it on place 1.

%d bloggers like this:

By continuing to use the site, you agree to the use of cookies and to its Privacy Policy more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.