sábado, 6 de janeiro de 2018

Derreteu


Sobre as falhas Meltdown e Spectre:

https://meltdownattack.com/
https://googleprojectzero.blogspot.com.br/2018/01/reading-privileged-memory-with-side.html
https://gist.github.com/woachk/2f86755260f2fee1baf71c90cd6533e9
https://github.com/marcan/speculation-bugs/blob/master/README.md
https://groups.google.com/forum/m/#!topic/mechanical-sympathy/L9mHTbeQLNU
https://www.renditioninfosec.com/files/Rendition_Infosec_Meltdown_and_Spectre.pdf
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
https://www.redhat.com/en/blog/what-are-meltdown-and-spectre-here%E2%80%99s-what-you-need-know
https://access.redhat.com/articles/3307751
https://www.raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/
https://www.schneier.com/blog/archives/2018/01/spectre_and_mel_1.html
https://fedoramagazine.org/kpti-new-kernel-feature-mitigate-meltdown/
http://www.kroah.com/log/blog/2018/01/06/meltdown-status/
https://support.google.com/faqs/answer/7625886
https://newsroom.intel.com/wp-content/uploads/sites/11/2018/01/Intel-Analysis-of-Speculative-Execution-Side-Channels.pdf
https://www.amd.com/en/corporate/speculative-execution
https://developer.arm.com/support/security-update
https://www.kb.cert.org/vuls/id/584653
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
https://sites.google.com/a/chromium.org/dev/Home/chromium-security/ssca
https://blogs.windows.com/msedgedev/2018/01/03/speculative-execution-mitigations-microsoft-edge-internet-explorer/
https://github.com/ionescu007/SpecuCheck

Como sempre: atualize seu sistema operacional, programas (navegadores, especialmente!) e BIOS/UEFI.

Mesmo assim, solução definitiva apenas com novo hardware...

Gostei dos logotipos.

Nenhum comentário:

Postar um comentário