Archive for Intel

Microsoft Details Performance Impact of Spectre & Meltdown Mitigations On Windows Systems…. And You Won’t Like Them

Posted in Commentary with tags , , , on January 9, 2018 by itnerd

In case you were wondering how fixes for Spectre and Meltdown will affect you from a speed perspective, Microsoft has done the work for you to find out. Delivering the news is Microsoft’s Windows chief Terry Myerson via this blog post:

With Windows 10 on newer silicon (2016-era PCs with Skylake, Kabylake or newer CPU), benchmarks show single-digit slowdowns, but we don’t expect most users to notice a change because these percentages are reflected in milliseconds.

With Windows 10 on older silicon (2015-era PCs with Haswell or older CPU), some benchmarks show more significant slowdowns, and we expect that some users will notice a decrease in system performance. With Windows 8 and Windows 7 on older silicon (2015-era PCs with Haswell or older CPU), we expect most users to notice a decrease in system performance.

Windows Server on any silicon, especially in any IO-intensive application, shows a more significant performance impact when you enable the mitigations to isolate untrusted code within a Windows Server instance. This is why you want to be careful to evaluate the risk of untrusted code for each Windows Server instance, and balance the security versus performance tradeoff for your environment.

For context, on newer CPUs such as on Skylake and beyond, Intel has refined the instructions used to disable branch speculation to be more specific to indirect branches, reducing the overall performance penalty of the Spectre mitigation. Older versions of Windows have a larger performance impact because Windows 7 and Windows 8 have more user-kernel transitions because of legacy design decisions, such as all font rendering taking place in the kernel.

Take home message, if you’re PC is recent, it’s a non-issue. If it’s older, it sucks to be you. And if you’re running Windows Server, well…. You’re taking a hit no matter what CPU you have and it truly sucks to be you. This is one of the reasons why this CPU bug from Intel, AMD, and ARM is a big bloody deal. Because while the security implications are extremely problematic, the cure for them may be worse than the disease.

Surprise! Intel Gets Sued Over Epic CPU Vulnerabilities

Posted in Commentary with tags on January 5, 2018 by itnerd

To the surprise of nobody on planet Earth, Intel is facing multiple class-action lawsuits over the Meltdown and Spectre vulnerabilities. The Guardian is reporting that three separate suits have been filed by plaintiffs in California, Oregon and Indiana. The plaintiffs are seeking compensation because of the security vulnerability as well as Intel’s failure to disclose it in a timely fashion. On top of that, they want compensation for whatever slowdown to their PCs that will be caused by the fixes needed to address the security concerns.

I’m predicting that this is only going to get worse for Intel. There will be more lawsuits filed, and some of those will come from cloud providers like Amazon, Google and Microsoft who care about how the speed and security issues related to this impact their businesses.

Get the popcorn ready, because Intel has a full blown disaster on its hands.

Linus Torvalds Calls Out Intel Over Epic CPU Vulnerability In Epic Fashion

Posted in Commentary with tags on January 4, 2018 by itnerd

Linus Torvalds who is the man behind the LINUX operating system, which means he has some “street cred” as the kids say, had some choice words for Intel via this post. In short, he was enraged by the statement that the chip giant made in relation to the CPU vulnerability that came to light in the last couple of days. Here’s the key point:

I think somebody inside of Intel needs to really take a long hard look
at their CPU’s, and actually admit that they have issues instead of
writing PR blurbs that say that everything works as designed.

.. and that really means that all these mitigation patches should be
written with “not all CPU’s are crap” in mind.

Or is Intel basically saying “we are committed to selling you shit
forever and ever, and never fixing anything”?

Because if that’s the case, maybe we should start looking towards the
ARM64 people more.

Mic drop.

That’s a slap to the face. But to be fair, I said this yesterday when I covered the release of this statement:

Interesting. A statement that’s designed to create plausible deniability and avoid a massive lawsuit. 

The fact is Intel has some explaining to do. And if they can’t explain this adequately, I wonder how they would feel if Apple, Dell, ASUS, HP and others migrate to AMD chips? Would that get their attention?

Intel, AMD, ARM All Make Statements About Epic CPU Bug… Alongside New Details About The Bug

Posted in Commentary with tags , , on January 3, 2018 by itnerd

This morning it came to light that there was a memory access design flaw in Intel processors and fixing it could lead to a performance drop.

Security researchers have now shared details about two separate critical vulnerabilities impacting most Intel processors and some ARM processors. Called Meltdown and Spectre, which sound like the names of James Bond movies. But I digress. The vulnerabilities offer hackers access to data from the memory of running apps, providing passwords, emails, documents, photos, and more. In short, if you have bought a computer or smartphone since 1995, the pwnage is real for you but it is patchable. However, Spectre impacts all processors, including those from ARM and AMD, and while it is harder to exploit, there is no known fix. Fully addressing Spectre will require a re-architecture of how processors are designed. Google has also shared details on the exploits. Full research papers on Meltdown and Spectre are available here. Oh yeah, proof of concept exploits are in the wild as we speak. It’s not known if hackers have exploited Meltdown and Spectre. But if they haven’t, they will.

Late today Intel came out with a statement posted on its website, Intel says that it planned to disclose the vulnerability next week when additional software patches were available, but was forced to make a statement today due to “inaccurate media reports.” Whatever that means. Here’s part of the statement:

Intel and other technology companies have been made aware of new security research describing software analysis methods that, when used for malicious purposes, have the potential to improperly gather sensitive data from computing devices that are operating as designed. Intel believes these exploits do not have the potential to corrupt, modify or delete data.

Recent reports that these exploits are caused by a “bug” or a “flaw” and are unique to Intel products are incorrect. Based on the analysis to date, many types of computing devices — with many different vendors’ processors and operating systems — are susceptible to these exploits.

Interesting. A statement that’s designed to create plausible deniability and avoid a massive lawsuit. But wait, there’s more!

Intel has begun providing software and firmware updates to mitigate these exploits. Contrary to some reports, any performance impacts are workload-dependent, and, for the average computer user, should not be significant and will be mitigated over time.

That’s clearly designed to blunt any criticisms of the whatever patches are needed to fix this. Interestingly,  AMD came out with a statement that says this:

There is a lot of speculation today regarding a potential security issue related to modern microprocessors and speculative execution. As we typically do when a potential security issue is identified, AMD has been working across our ecosystem to evaluate and respond to the speculative execution attack identified by a security research team to ensure our users are protected.

To be clear, the security research team identified three variants targeting speculative execution. The threat and the response to the three variants differ by microprocessor company, and AMD is not susceptible to all three variants. Due to differences in AMD’s architecture, we believe there is a near zero risk to AMD processors at this time. We expect the security research to be published later today and will provide further updates at that time.

And ARM says this:

I can confirm that ARM have been working together with Intel and AMD to address a side-channel analysis method which exploits speculative execution techniques used in certain high-end processors, including some of our Cortex-A processors. This method requires malware running locally and could result in data being accessed from privileged memory. Please note our Cortex-M processors, which are pervasive in low-power, connected IoT devices, are not impacted.

We are in the process of informing our silicon partners and encouraging them to implement the software mitigations developed if their chips are impacted.

Sounds like of the three, ARM is the most honest. With AMD coming in a very close second. Intel strangely says nothing about reading kernel level data in their statement. You have to wonder why that is.

#Fail: Intel Chips Have Memory Access Design Flaw & The Fix Could Lead To A Performance Drop

Posted in Commentary with tags on January 3, 2018 by itnerd

This isn’t good. A serious design flaw and security vulnerability has been discovered in Intel’s CPUs that will require an update at the operating system level to fix, reports The Register:

Programmers are scrambling to overhaul the open-source Linux kernel’s virtual memory system. Meanwhile, Microsoft is expected to publicly introduce the necessary changes to its Windows operating system in an upcoming Patch Tuesday: these changes were seeded to beta testers running fast-ring Windows Insider builds in November and December.

So a fix is inbound. But the fix might be worse than the cure:

Crucially, these updates to both Linux and Windows will incur a performance hit on Intel products. The effects are still being benchmarked, however we’re looking at a ballpark figure of five to 30 per cent slow down, depending on the task and the processor model. More recent Intel chips have features – such as PCID – to reduce the performance hit. Your mileage may vary.

And for you Mac fans out there, you’re affected too. Not to mention quite a few other operating systems:
Similar operating systems, such as Apple’s 64-bit macOS, will also need to be updated – the flaw is in the Intel x86-64 hardware, and it appears a microcode update can’t address it. It has to be fixed in software at the OS level, or go buy a new processor without the design blunder.
Excellent. And by excellent I mean that this sucks. So, what is the actual vulnerability:

At best, the vulnerability could be leveraged by malware and hackers to more easily exploit other security bugs.

At worst, the hole could be abused by programs and logged-in users to read the contents of the kernel’s memory. Suffice to say, this is not great. The kernel’s memory space is hidden from user processes and programs because it may contain all sorts of secrets, such as passwords, login keys, files cached from disk, and so on. Imagine a piece of JavaScript running in a browser, or malicious software running on a shared public cloud server, able to sniff sensitive kernel-protected data.

Now the details are light and understandably so. Though one suspects that some evil doer is likely trying to figure out how to exploit this as we speak. What details do exist can be found at The Register story that I linked to. But this is a major screw up by Intel which is further underscored by the fact that AMD processors don’t have this issue. And seeing as it affects Intel processors that have been around for the last 10 year or so, this will likely be a significant story in 2018.

UPDATE: Mac users apparently don’t have to worry. If you’re running macOS 10.13.2, it was fixed in that version according to kernel expert Alex Ionescu:

https://twitter.com/aionescu/status/948609809540046849

And if you were worried about a performance drop because of this fix on your Mac:

https://twitter.com/aionescu/status/948613035861553152

 

Oh yeah. Proof of concept exploit code now exists, which is bad of course:

Many Canadians Don’t Know How To Check If Their Connected Devices Have Been Compromised: Intel Security

Posted in Commentary with tags on February 27, 2017 by itnerd

A recent Intel Security shows that although protecting personal information is top of mind for Canadian consumers, they often fall short in taking the proper precautions to do so.

Some of the key findings include:

  • Canadians are worried about the security of their financial information. In fact, 44% of survey respondents are most concerned about a hacker stealing personal financial information.
  • The fear of losing personal information has many Canadian consumers motivated to keep a close eye on their devices. 83% of consumers check to ensure their connected devices have not been compromised.
  • Unfortunately, 51% of Canadians don’t know how to check to make sure their devices or applications have not been compromised.
  • Top Canadian consumer cybersecurity concerns include:
    • Theft of their personal financial information (44%)
    • Identity theft (38%)
    • Being watched or listened to if their device has been compromised (23%)

Below are some tips from Gary Davis, Chief Consumer Security Evangelist with Intel Security, that can help Canadians remain safe while leading a connected life:

  • Lock down your devices. Our devices are like an extension of our bodies. It’s imperative that they are locked down with a strong PIN code, as well as complex and unique passwords to prevent unauthorized access. Use a multi-factor authentication (MFA) solution, like True Key by Intel Security, that will combine your strong passwords with an extra layer of security – like your fingerprint or facial recognition.
  • Keep your devices updated. Be sure to update your devices when new versions of the operating system or applications become available. Updates often include critical security fixes designed to patch and protect from attacks.
  • Take control of your home network. Setting up a guest Wi-Fi network allows visitors to access the internet but keeps your home network private and isolated from their devices. You can also separate your IoT devices (smart home devices, wearables, etc.) from traditional connected devices (laptops, smartphones, tablets, etc.) where more secure information is stored, so if an IoT devices is compromised, the breach will be limited to devices connected to the guest network. Solutions, such as McAfee Secure Home Platform [Warning: PDF], help you easily manage and protect devices connected to both networks, and can ensure that guest devices connected to your network don’t open you up to an attack.

More information is available in a blog post by Gary at: https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/connected-life/

Intel Security commissioned OnePoll to conduct a survey of 13,000 adults (aged 18-55+) in December 2016. Respondents used an internet-connected device on a daily basis and were based in the following regions: Australia, Brazil, Canada, France, Germany, India, Italy, Japan, Mexico, the Netherlands, Singapore, Spain, the UK, and the U.S.

Canadian IT Departments Find It Hard to Keep the Cloud Safe: Intel Security

Posted in Commentary with tags on February 13, 2017 by itnerd

Intel Security today announced its second annual cloud security report, “Building Trust in a Cloudy Sky.” The report outlines the current state of cloud adoption, the primary concerns with private and public cloud services, security implications, and the evolving impact of Shadow IT of the more than 2,000 IT professionals from around the world surveyed.

Trust in the Cloud on the Rise 

The trust and perception of public cloud services continues to improve year over year. Most organizations view cloud services as, or more, secure than private clouds, and more likely to deliver lower costs of ownership and overall data visibility. Those who trust public clouds now outnumber those who distrust public clouds by more than 2-to-1. Improved trust and perception, as well as increased understanding of the risks by senior management, is encouraging more organizations to store sensitive data in the public cloud. Personal customer information is the most likely type of data to be stored in public clouds, kept there by 64 per cent of Canadian organizations surveyed.

Risks Also Rise: Shadow IT and the Cybersecurity Skill Shortage

The ongoing shortage of security skills is continuing to affect cloud deployments. Half of the Canadian organizations surveyed report the lack of cybersecurity skills has slowed adoption or usage of cloud services, possibly contributing to the increase in Shadow IT activities. Another 35 per cent report they are experiencing a scarcity but are continuing with their cloud activities regardless. Only 15 per cent of those surveyed state they do not have a skills shortage.

Due to the ease of procurement, almost 40 per cent of cloud services are now commissioned without the involvement of IT, and unfortunately, visibility of these Shadow IT services has dropped from about 50 per cent last year to just under 47 per cent this year. As a result, 60 per cent of Canadian IT professionals think this phenomenon is interfering with their ability to keep the cloud safe and secure. This is not surprising given the amount of sensitive data now being stored in the public cloud and more than half (52 per cent) of Canadian respondents reported they have definitively tracked malware from a cloud SaaS application.

Data Centre Progression

The number of organizations globally using private cloud only has dropped from 51 per cent to 24 per cent over the past year, while hybrid cloud use has increased from 19 per cent to 57 per cent. This move to a hybrid private/public cloud architecture requires the data centre to evolve to a highly virtualized, cloud-based infrastructure. On average, 52 per cent of an organization’s data centre servers are virtualized, 80 per cent are using containers and most expect to have the conversion to a fully software-defined data centre completed within two years.

Recommendations:

  • Attackers will look for the easiest targets, regardless of whether they are public, private or hybrid. Integrated or unified security solutions that provide visibility across all of the organization’s services could be the best defense.
  • User credentials, especially for administrators, will be the most likely form of attack. Organizations need to ensure they are using authentication best practices, such as distinct passwords, multi-factor authentication and even biometrics where available.
  • Security technologies such as data loss prevention, encryption and cloud access security brokers (CASBs) remain underutilized. Integrating these tools with an existing security system increases visibility, enables discovery of shadow services, and provides options for automatic protection of sensitive data at rest and in motion throughout any type of environment.
  • Organizations need to evolve toward a risk management and mitigation approach to information security. They should consider adopting a Cloud First strategy to encourage adoption of cloud services to reduce costs and increase flexibility, and put security operations in a proactive position instead of a reactive one.

Survey Methodology

In fall 2016, Intel Security surveyed over 2,000 IT professionals across a broad set of industries, countries and organization sizes. Research participants were senior technical decision-makers from small, medium and large organizations located in Australia, Brazil, Canada, France, Germany, Japan, Mexico, Saudi Arabia, Singapore, the United Arab Emirates, the United Kingdom and the United States.

To download the full report, visit www.mcafee.com/ca/solutions/lp/cloud-security-report.html.

 

Review: McAfee Total Protection

Posted in Products with tags on October 25, 2016 by itnerd

These days, you have a lot of choice when it comes to securing your devices. Both free and paid options are available for users on a number of platforms. One the latter choices is McAfee Total Protection which is a multi-platform solution that protects you for any and all threats whether you use a Mac, PC, smartphone, or tablet. To fully test this, I set this up on both my Macs, my Windows 10 computer, an iPhone, and an Android phone.

On all platforms, the product was very easy to install and manage from a web based console, and it had very minimal impact to the performance of whatever device I tried it on. Plus it found every test virus that I threw at it. But some of the features varied from platform to platform. For example: 

  • PC: McAfee Total Protection includes LiveSafe includes a two-way firewall and a vulnerability scanner that proactively maintains the latest Windows updates. There are parental controls so you can block content that you might find objectionable, limit the time of sessions on the computer and receive reports that help you monitor online behavior. The app will flag any malicious sites returned in search results and it also does not let intruders reach your PC over a Wi-Fi network. The PC version also repairs any problems that might arise in the Windows registry and it includes a file shredder that destroys deleted files so that file recovery software will not be able to find and resurrect them.

  • Mac: McAfee Total Protection antimalware, antispyware and antiphishing, LiveSafe scans incoming email and instant messages and can repair and remove infections from files without damaging the files. LiveSafe supports Safari and will color code web search results to warn you about malicious sites.
  • On smartphones and tablets, the application takes care of malware and spyware. And whether you are using iOS or Android, there are utilities that allow you to recover from a lost or stolen device by locating and tracking it on a map and wiping its data remotely. Though, iOS and Android do the latter natively. Thus I wonder how valuable that is. Also, there isn’t really a whole lot of threats on the iOS platform. Thus I wonder how valuable that is. 

McAfee Total Protection is a subscription based service that is $50 a year. You get to protect an unlimited amount of devices. However, you also get 5 licences for True Key by Intel Security which Recognizes your face or fingerprint, secures your passwords, and instantly logs you in to your websites and apps across your devices. If using a free applicaiton isn’t an option for you, McAfee Total Protection is an option that you should look at regardless of what platform you’re on. 

Infographic: Who Unplugs When On Vacation

Posted in Commentary with tags on June 22, 2016 by itnerd

2016_Unplugged_fnl_cdn.png

Source: Intel Security

Intel Security Reveals Security Risks Associated With Unsafe Online Search Trends

Posted in Commentary with tags on May 17, 2016 by itnerd

With the summer season approaching, May is a popular month to start a new diet routine, and people are turning online for quick solutions. Thanks to better weather, more hours of sunlight and planned vacations, consumers have more opportunities to be active, which kick-starts a new wave of diets long after New Year’s resolutions come to an end. So it is timely that Intel Security today released findings from its new study, “Online Security Diet: You Are What You Click,” which examines the online behaviours and attitudes of Canadians ages 21 to 54 toward dieting clickbait. The research revealed that when it comes to the desire for the ideal body, people may be willing to sacrifice their online security if it takes them a step closer to achieving desired results.

Key highlights include:

  • 56 per cent of survey respondents have clicked on a promotional link that offers a diet program.
  • 50 per cent of survey respondents would most likely click on a promotional link for a diet program before the summer.
  • 26 per cent of respondents are more likely to click on a promotional link or an article offering dietary tips featuring or endorsed by a celebrity.
  • 19 per cent of survey respondents have purchased a service or product from a promotional link without knowing whether or not it’s a secure site.
  • More than 40 per cent of respondents would be likely to click on a promotional link for diet programs generated by a Google search (42 per cent), with others reporting they would click links featured on Facebook (36 per cent), a website (26 per cent), or within an app that they already use (19 per cent).
  • Many respondents report they are willing to share information like email address (57 per cent), full name (39 per cent) or age (40 per cent) with a website, service or company in hopes of reaching their goal weight or dream body.
  • Yet 43 per cent of respondents don’t know how to check if a website is secure before providing payment details or personal information.

How You Can Better Protect Yourself to Avoid Online Diet Scams:

  • Click with caution. Offers from sites that seem too good to be true, such as “Lose 10 pounds in one week,” may indicate that a site should be viewed with caution. Websites or emails might include phishing links that can lead you to sites that lure you into giving personal information to cybercriminals or download malware to your computer.
  • Browse safely. Beware of phony websites. Sites aimed at scamming consumers may have an address very similar to a legitimate site, like “Wait Watchers” opposed to “Weight Watchers.” Phony sites often have misspellings, poor grammar or low-resolution images. If a site asks for personal information, double check the URL, and make sure it’s the site you intended to visit and not an imposter. Use a web reputation tool such as McAfee WebAdvisor that can help identify risky sites and inform you that you may be about to visit one.
  • Develop strong passwords. Do away with the “123321” password, and use a strong one, like “9&4yiw2pyqx#.” Regularly change passwords and don’t use the same passwords across all your accounts. As a way to improve the quality of your passwords, consider using a password manager.
  • Stay up to date. The best security software updates automatically to protect your computer. Use the manufacturer’s latest operating systems and allow security patches to be updated on an ongoing basis. Also ensure you have the appropriate software set to conduct routine scans.
  • Use a comprehensive security solution. Protecting all your devices with a comprehensive security solution, like McAfee LiveSafe, can help shield you from malware and other cyberattacks.

To find out more information:

You can also visit the Intel Security Facebook page at facebook.com/intelsecurity and McAfee Security Advice Center for information on the latest consumer threats and tips for living safer online.