Microsoft’s Meltdown & Spectre Fixes Made Windows 7 PCs MORE INSECURE

We all know very well that the Meltdown and Spectre were two of the most recent serious flaws discovered in the world of technology. However, now according to the latest reports, the tech giant Microsoft’s Meltdown and Spectre fixes have made Windows 7 PCs more insecure.

Microsoft’s Meltdown Spectre Fixes Made Windows 7 PCs MORE INSECURE

The Meltdown and Spectre were two of the most recent serious flaws discovered in the world of technology, specifically, they are failures that affect the processors of nearly all brands, opening doors to criminal actions.

The brands have been releasing the fix for the flaws, but, now it has been discovered that with these updates Windows 7 ended up getting insecure with a new serious vulnerability.

The whole process of correcting Meltdown and Spectre flaws was confusing, information about the flaw was not new, dated back to 1991, and much of that information was highly complex, which did not make targeting malware an easy task or reach of any “hacker”. But at the same time, fixing the problem has become a headache.

An analysis by a security expert has now revealed a new serious vulnerability in Windows 7, the result of the update that was released to fix the issues.

What Ulf Frisk discovered (and revealed) was that Windows 7 and Windows Server 2008 R2 which allowed normal processes to now have full (write and read) access to physical memory.

This means that with these new permissions it becomes possible to exploit the system and gain administrator privileges on vulnerable machines.

The failure was introduced in January, with the security update that was released. As Ulf Frisk has revealed, the latest systems are protected and not vulnerable.

It has not been simple to correct this problem, which is still far from being resolved. Users are still vulnerable, and as you can see now even the solutions bring new problems.

So, what do you think about this? Simply share all your views and thoughts in the comment section below.

COMMENTS