- Fans call out Madonna for edited Eurovision video Tuesday 9:36 PM
- Partnered Twitch streamer temporarily banned for airing troll’s racist message Tuesday 8:45 PM
- Reddit theory says fans are wrong about who won ‘Game of Thrones’ Tuesday 6:52 PM
- Elon Musk hires ‘absolute unit’ sheep meme creator to be Tesla’s social media manager Tuesday 6:12 PM
- Jason Momoa stands by his Khaleesi after the ‘Game of Thrones’ finale Tuesday 4:05 PM
- Airbnb, 23andMe partner for creepy heritage travel recommendations Tuesday 3:26 PM
- Rep. Katie Porter goes viral again for trouncing Ben Carson (updated) Tuesday 3:26 PM
- This deepfake takes Bill Hader’s Schwarzenegger impression to the next level Tuesday 2:58 PM
- Wanda Sykes rails against Trump and offers much-needed perspective in ‘Not Normal’ Tuesday 2:41 PM
- Man arrested after allegedly threatening to shoot YouTube employees Tuesday 2:13 PM
- Some House Dems are backing away from the Save the Internet Act Tuesday 1:40 PM
- Thousands sign petition calling for Danny DeVito to play Wolverine Tuesday 1:02 PM
- Jason Mitchell fired from ‘Desperados’ and ‘The Chi’ after misconduct allegations Tuesday 12:36 PM
- Police raid Black woman’s house after white neighbor complains about loud Malcolm X speeches Tuesday 12:20 PM
- ‘Transfixed’ says it’s a ‘breakthrough’ series, but it still fetishizes trans bodies Tuesday 11:04 AM
Simon Waldherr/Flickr (CC-BY-SA)
A patch is being developed—but it may slow your computer down.
Google and Microsoft researchers have discovered a new computer processing unit vulnerability that’s a variant of the Meltdown and Spectre bugs uncovered earlier this year. Fortunately, the issue known as Speculative Store Bypass will soon be patched via a firmware update. Unfortunately, that patch will likely slow your machine down.
In January, security researchers unveiled a pair of security flaws that affected nearly every modern processor, from smartphones to desktop computers. Dubbed Meltdown and Spectre, the critical security vulnerabilities could render memory on your computer readable by outside parties, leaving sensitive information such as passwords, security keys, and files open to hackers. The problem affected virtually all x86 Intel CPUs shipped over the past 23 years, as well as CPUs from Arm and other chipmakers.
The latest CPU vulnerability functions similarly to Spectre, the Verge reported. Microsoft discovered Speculative Store Bypass back in November and has been working with Intel and Advanced Micro Devices since then to determine its impact on PCs, as well as a fix. Luckily, most modern browsers—including Edge, Safari, and Chrome—were patched for Meltdown earlier this year, and they are already protected against this new threat.
For firmware, however, the update isn’t so peachy. Intel has shipped beta microcode updates for Speculative Store Bypass to manufacturers, which should ship over the next few weeks.
Protection against the CPU vulnerability will be switched off as a default—users will need to actively enable it—but doing so could slow computers down anywhere from 2 to 8 percent, according to the Verge. Thus, users will need to choose between extra security for their machine or continued performance levels.
Thankfully, this variant of Spectre and Meltdown doesn’t seem to be as insidious as the originals. As for the future, Intel is working to redesign its processors—including its chips shipping later this year—to protect against all these bugs.
H/T the Verge
Christina Bonnington is a tech reporter who specializes in consumer gadgets, apps, and the trends shaping the technology industry. Her work has also appeared in Gizmodo, Wired, Refinery29, Slate, Bicycling, and Outside Magazine. She is based in the San Francisco Bay Area and has a background in electrical engineering.