Vulnerability Warning: Intel CPU
By now you may have heard about the ‘Intel CPU Vulnerability’ and may have even started to receive emails from your Antivirus vendor with information regarding patching. This latest vulnerability is also commonly known as ‘Meltdown’.
Meltdown breaks the most fundamental isolation between user applications and the operating system. This vulnerability allows a program to access the memory, and thus also the secrets, of other programs and the operating system. Meltdown affects personal computers, mobile devices, servers, and cloud systems.
Meltdown breaks the most fundamental isolation between user applications and the operating system. This vulnerability allows a program to access the memory, and thus also the secrets, of other programs and the operating system. Meltdown affects personal computers, mobile devices, servers, and cloud systems.
If your computer has a vulnerable processor and runs an unpatched operating system, it is not safe to work with sensitive information without the chance of leaking the information. Luckily, there are software patches being released by Microsoft, Apple, and Linux providers to repair the vulnerability.
Meltdown uses similar techniques to many modern Antivirus programs. As such, patching the vulnerability may cause issues with system stability and Antivirus functionality. We will work with our vendors to identify, update, and patch relevant Antivirus products to then enable patching of affected operating systems.
“We are committed to patching all affected systems as quickly as possible. We continue to work closely with our vendors to monitor and protect our customers.”
Michael Strong, COO
For more information about the details of the vulnerability, visit this public information site. If you have any questions or inquiries, please contact us.
Always verify who you are speaking with. Whether we initiate a call or visit your location, use this tool to ensure the person you're interacting with is a verified Blue Layer agent.
Trust, but verify all contacts.