- How Netflix’s ‘Umbrella Academy’ found its eye-popping style 9 Months Ago
- ‘Lorena’ deserves to be your new true crime obsession 9 Months Ago
- How to stream the 2019 NBA All-Star Weekend for free 9 Months Ago
- ‘Star Trek: Discovery’ visits an old friend in ‘Saints of Imperfection’ Thursday 8:30 PM
- Dudes swallow AirPods in YouTube challenge video no one asked for Thursday 8:22 PM
- New R. Kelly underage sex assault tape reportedly surfaces Thursday 7:05 PM
- Kanye hired Kenny G to play jazz amid a sea of roses for Valentine’s Day—and it’s a meme Thursday 5:59 PM
- Fox News reportedly nixed ad for documentary about 1939 Nazi rally Thursday 4:22 PM
- People are roasting this woman’s tips for avoiding a ‘manrepeller’ apartment Thursday 3:59 PM
- Conservatives split on Trump’s national emergency to fund border wall Thursday 3:42 PM
- ‘Shoplifters’ is a quiet, astounding look at the connections we share Thursday 12:06 PM
- NRA, Republicans team up to bash gun reform on Parkland anniversary Thursday 11:51 AM
- Parent fears Apex Legends will make their kid transgender Thursday 11:50 AM
- Netflix claims subscribers have the same 6 shows in common Thursday 11:46 AM
- New Yorkers rejoice over Amazon pulling out of HQ2 deal Thursday 11:45 AM
Simon Waldherr/Flickr (CC-BY-SA)
A patch is being developed—but it may slow your computer down.
Google and Microsoft researchers have discovered a new computer processing unit vulnerability that’s a variant of the Meltdown and Spectre bugs uncovered earlier this year. Fortunately, the issue known as Speculative Store Bypass will soon be patched via a firmware update. Unfortunately, that patch will likely slow your machine down.
In January, security researchers unveiled a pair of security flaws that affected nearly every modern processor, from smartphones to desktop computers. Dubbed Meltdown and Spectre, the critical security vulnerabilities could render memory on your computer readable by outside parties, leaving sensitive information such as passwords, security keys, and files open to hackers. The problem affected virtually all x86 Intel CPUs shipped over the past 23 years, as well as CPUs from Arm and other chipmakers.
The latest CPU vulnerability functions similarly to Spectre, the Verge reported. Microsoft discovered Speculative Store Bypass back in November and has been working with Intel and Advanced Micro Devices since then to determine its impact on PCs, as well as a fix. Luckily, most modern browsers—including Edge, Safari, and Chrome—were patched for Meltdown earlier this year, and they are already protected against this new threat.
For firmware, however, the update isn’t so peachy. Intel has shipped beta microcode updates for Speculative Store Bypass to manufacturers, which should ship over the next few weeks.
Protection against the CPU vulnerability will be switched off as a default—users will need to actively enable it—but doing so could slow computers down anywhere from 2 to 8 percent, according to the Verge. Thus, users will need to choose between extra security for their machine or continued performance levels.
Thankfully, this variant of Spectre and Meltdown doesn’t seem to be as insidious as the originals. As for the future, Intel is working to redesign its processors—including its chips shipping later this year—to protect against all these bugs.
H/T the Verge
Christina Bonnington is a tech reporter who specializes in consumer gadgets, apps, and the trends shaping the technology industry. Her work has also appeared in Gizmodo, Wired, Refinery29, Slate, Bicycling, and Outside Magazine. She is based in the San Francisco Bay Area and has a background in electrical engineering.