strredwolf: (CuteFace)
[personal profile] strredwolf
Okay, unlike some things, I'm not going to bore you with details.  This one's a doozy and if I was a security expert, I would of downloaded in my pants now.  It's that bad if you got way-old Intel hardware... or AMD hardware.

If you got Intel hardware, you need to see what chip archetecture it is:

  • On Windows, download the CPUID CPU-Z program. Install it and run it. If it says you're on AMD hardware, you're vunerable.  Otherwise, you're looking for the CPU's Code Name.  If it doesn't start with the following, you're likely vunerable:  Haswell, Skylake, Ivy Bridge, Sandy Bridge, Merrifield, Moorefield, Bay Trail, Avoton, Rangeley

  • On Linux, run "cat /proc/cpuinfo | less" on the command line.  If the "Model name" says AMD, you're vunerable.  Otherwise look for the CPU family  and model number.  If the CPU family is not 6, or the model number is below 42, you're vunerable.

  • On MacOS X, go Apple Menu >> About This Mac.  If your Mac is late 2011 to now, you're safe.

I repeat, if you're on AMD hardware, you're vunerable.

And if you're vunerable, right now the only cure is to migrate to the lastest (post 2013) Intel hardware.

The short end of it is, it's a flaw in how the CPU's were designed that allows a hacker to get into your PC without ANYTHING to stop it.  Intel fixed it in late 2011 in the Sandy Bridge archetecture, and is working on fixes at the microcode level to the older PCs... but AMD hasn't responded to any responsible disclosure.

The techies and programmers can get more details here: https://github.com/xoreaxeaxeax/sinkhole

Profile

strredwolf: (Default)
STrRedWolf

September 2017

S M T W T F S
     12
3 456789
101112 13141516
17181920212223
24252627282930

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Sep. 19th, 2017 11:53 am
Powered by Dreamwidth Studios