(+1) 352 224 4288

Emerald Data Partners
  • SERVICES
    • Help Desk and Onsite Support
    • Computer Security
    • Consulting and strategy
    • Cloud computing
    • Data Backup and Disaster Recovery
    • Communication and Collaboration
  • OUR METHOD
    • TECHNOLOGY CONSULTING
      • Dedicated vCIO
      • Technology summaries
      • Design desk
      • Budget planning
      • Business impact
    • NETWORK ADMINISTRATION
      • Dedicated net admin
      • Technology checklist
      • Best practices
      • Central services review
    • PROACTIVE MANAGEMENT
      • Remote management
      • Monitored backup
      • Managed antivirus
      • Network monitoring
      • Patch management
    • REACTIVE SUPPORT
      • Help desk support
      • On-site support
      • Problem isolation
      • How-to questions
      • Customer portal
  • ABOUT US
  • JOBS
  • BLOG
  • CONTACT US
  • SERVICES
    • Help Desk and Onsite Support
    • Computer Security
    • Consulting and strategy
    • Cloud computing
    • Data Backup and Disaster Recovery
    • Communication and Collaboration
  • OUR METHOD
    • TECHNOLOGY CONSULTING
      • Dedicated vCIO
      • Technology summaries
      • Design desk
      • Budget planning
      • Business impact
    • NETWORK ADMINISTRATION
      • Dedicated net admin
      • Technology checklist
      • Best practices
      • Central services review
    • PROACTIVE MANAGEMENT
      • Remote management
      • Monitored backup
      • Managed antivirus
      • Network monitoring
      • Patch management
    • REACTIVE SUPPORT
      • Help desk support
      • On-site support
      • Problem isolation
      • How-to questions
      • Customer portal
  • ABOUT US
  • JOBS
  • BLOG
  • CONTACT US

Computer Support News

Alachua, Gainesville, Lake City, High Springs computer support
January 19, 2018 In Blog

Critical browser vulnerabilities discovered

According to security researchers, a bulk of the world’s computer processors have gaping flaws. The flaws, grouped under the term ‘Spectre,’ affect many critical systems including web browsers like Chrome, Safari, Microsoft Edge, and Firefox. Here’s a quick rundown of these major vulnerabilities and what you can do to secure them.

What is Spectre?
To understand this unprecedented vulnerability, you need to know some computer chip basics. Modern chips try to speed up their work by storing information related to predictable and repetitive processes. Whenever CPUs perform calculations ahead of time that end up being unnecessary, the data is thrown away into a supposedly secure storage cache.

Hackers can gain access to the discarded data by using malware to create digital backdoors. From there, they can simply sneak in, sift through the private information, and even trick the processor into throwing away even more sensitive information. This is known as a Spectre attack.

Though the exploit is highly technical and difficult to execute, researchers said Spectre affects all modern processors, including those developed by Intel, AMD, and ARM.

How does it affect browsers?
As mentioned, hackers would need to install malware on a device to perform a Spectre attack. One tactic experts found effective is if hackers build a malicious program and embed it on a website. Should anyone visit the rogue website, their browser will automatically run the malicious program.

Once inside, the attacker can use Spectre to gain full access to keystrokes, encryption keys, and login credentials.

So far, there is no evidence of Spectre attacks actively being used to steal data from web browsers, but they are difficult to detect. Experts also predict hackers will likely develop specialized malware now that this information is available to the public.

Is there a way to protect myself?
Fortunately, major browser developers were quick to release updates as soon as the Spectre attack was discovered.

Mozilla also has security features to prevent some Spectre attacks, but announced a full-blown solution is in the works.

As for Chrome, users can expect an update as early as January 23. But for the time being Google recommends enabling the Site Isolation feature, which limits how much access browser plugins have to your computer. This feature can be enabled by going to your address bar and entering: chrome://flags/#enable-site-per-process.

Even though the updates may affect browser performance, it’s a small price to pay compared with having your credit card or social security number stolen.
Like it or not, Spectre is just one of the many threats targeting your web browsers. That’s why you should call us today. We offer expert advice and cutting-edge solutions to make sure your browsing experience is a pleasant and safe one.

Source: tech

NEWS
Previous StoryShould you use UPS for your network gear?
Next Story3 simple and easy cyber-security tips!

Related Articles

  • The top 4 new features in the Windows 10 update
  • What are watering hole attacks?

no replies

Leave your comment Cancel Reply

(will not be shared)

Calendar

February 2019
M T W T F S S
« Apr    
 123
45678910
11121314151617
18192021222324
25262728  

Industries served

We service the healthcare, educational, municipal, local government, business, and non-profit markets. We provide complete on-premise servers, cloud hosting, AWS integration, virtualized environments, and more.

We service clients in Gainesville, Lake City, Live Oak, Cross City, Mayo, Perry, Newberry, High Springs, and surrounding cities.

About Emerald Data Partners

A full service IT service company located in North Central Florida, we service clients in the Gainesville, Lake City, and Live Oak areas complete computer support, network monitoring, disaster recovery, cloud computing, server repair, and more, for a fixed, monthly price. We are locally owned small business operating out of our High Springs, Florida offices.

Finding our office

Our offices are open Monday - Friday 8am-5pm. We are closed all federal and most state holidays.

We are located in the First Avenue Center in High Springs, FL next to the Smoke Fried Barbeque Restaurant. Search for "Emerald Data Partners" on Google Maps and we'll come right up. Our offices are considered secure and are not open to the public so we suggest you call before showing up.

Emerald Data Partners
Copyright ©2003-2017 Elgie May, LLC dba Emerald Data Partners. All Rights Reserved.