The security vulnerabilities revealed for Intel processors is arguably the worst way to start a new year, especially since repair requires complex steps for users and system administrators.
Of course, the issue of Intel has already been discussed a lot, but it is important to know that Windows users, regardless of the version they are running, can remain protected by an update of their system.
But patching through Windows Update is available μόνο στα Windows 10, ενώ όλα τα άλλα συστήματα θα μπορούν να αναβαθμιστούν αυτόματα στο Patch Tuesday – this month, next week's Patch Tuesday (January 9).
For those who use Windows and can't fix it until next week:
- Do not do click to links from unknown sources,
- Do not download attachments that include files
- and generally stay away from URLs that you do not know are trustworthy.
Microsoft has already released updates for Windows to protect Edge users and internet explorer 11 browsers, which could be used (via JavaScript) to exploit the flaws Meltdown and Specter.
Of course to be safe you need to have these updates installed.
Applications protections from viruses do not guarantee that they can protect you.
Although malware that exploits vulnerabilities in Intel processors can be detected and blocked, exploits are said to be more difficult to distinguish from clean applications running on your system.
Make sure you update your software useste for your protection, but do not rely entirely on it.
One of the worst things about these Intel vulnerabilities is that you can't tell if someone has compromised your system as well. leaves no traces. This means that an attacker could enter your computer, steal your passwords and then leave without you knowing anything.
It should also be noted that Microsoft states that only systems with compatible antivirus applications can have security updates, and obviously the company means Windows Defender.
If the antivirus solutions are not compatible with the new security updates installed on the system, you can manually set the following registry key:
Key="HKEY_LOCAL_MACHINE" Subkey="SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat" Value="cadca5fe-87d3-4b96-b7fb-a231484277cc" Type="REG_DWORD
Microsoft has not given further details or named them productantiviruses that are not compatible with the updates, but it says:
"during testIn our process, we discovered that some third-party applications make unsupported calls to Windows kernel memory that cause stop errors (also known as bluescreen errors). "
If you now have any of the following updates installed, you will need to restart your system.
We will probably see more firmware updates from Intel itself and other potentially affected parties suppliers The next days.
Below you can find all the updates for Meltdown and Specter vulnerabilities that affect Windows (make sure you download the correct version for your system):