Google patches for Meltdown, Spectre not slowing down systems


"Security is job number one for Intel and our industry", Krzanich also said, lauding the tech giants' joint efforts to contain the spread of Meltdown and Spectre exploits.

Intel has been hit by both Spectre and Meltdown and shares in all three chipmakers have been pushed around by the issues.

Intel is quietly telling some of its big customers to "delay" installing a fix it issued that was intended to address a major security vulnerability that became public last week, the Wall Street Journal reported.

For GPZ Variant 1, AMD mentions that it has been working closely with Microsoft to patch for AMD processors old and new.

"Microsoft has received reports of some AMD devices getting into an unbootable state after installation of recent Windows operating system security updates", the company said.

Beaumont says that companies whose AV products are designed to be used alongside other security software say they are loathe to set the key, in case other software on the system clashes with the fix. Most of the updates are available now, although Tesla and GRID users will have to wait until late January. However Intel has smartly responded to the solution by claimimg that average computer users should not be affected. We continue to develop and test further mitigations within the operating system for the Spectre techniques, and will release them in upcoming updates of iOS, macOS, tvOS, and watchOS. It has tried to minimise the effect since the news last week of a common processor design flaw that exposed many computers and devices - from smartphones to "smart" washing machines - to data loss.

Intel said this week that patches to its central processing units are slowing things down by 6 percent or less on its newest chips. To manually update the registry, follow this guide.

These two vulnerabilities can make anyone have access to a computer user's data even if they are not logged in to that particular user's account.

Meltdown, a bug, primarily affects devices using Intel chipsets while Spectre, a lesser known bug affects chipsets from Intel, AMD and ARM Holdings.

Spectre is a flaw in the way computers handle requests to look at sensitive information stored on low levels of memory. "This is why you want to be careful to evaluate the risk of untrusted code for each Windows Server instance, and balance the security versus performance tradeoff for your environment".