A simple way to check if your computer is protected against serious vulnerabilities in Intel processors
At the beginning of this world, the technical community received news of a very serious security hole at the level of Intel processors, extended and ARM. A group of companies, including Microsoft, have rushed to launch urgent updates to mitigate the consequences of potential attacks by Spectre and Meltdown. However, until recently, it was difficult for the average user to verify the security of his computer.
The serious changes include all Intel processors that have been released in the past 20 years. Which means that millions of users in the world are explicitly threatened with these new and dangerous loopholes, through which attackers can access all logins, passwords, cached files and any other personal user data.
But the question is, how do I know if my device is threatened by these loopholes?
Fortunately the Gibson Research Team released a simple tool which will quickly determine if your computer is at risk. This tool does not require installation and directly as an executable file.
In the main window of the tool, in addition to the diagnostic result, you can read the brief description of these gaps, as well as other details about the status of your computer. With this tool, you can disable or enable protection from these vulnerabilities if necessary.
Some security devices especially Microsoft programs consider this executable file as a virus, but it is just the wrong alarm you can ignore.
The serious changes include all Intel processors that have been released in the past 20 years. Which means that millions of users in the world are explicitly threatened with these new and dangerous loopholes, through which attackers can access all logins, passwords, cached files and any other personal user data.
But the question is, how do I know if my device is threatened by these loopholes?
Fortunately the Gibson Research Team released a simple tool which will quickly determine if your computer is at risk. This tool does not require installation and directly as an executable file.
In the main window of the tool, in addition to the diagnostic result, you can read the brief description of these gaps, as well as other details about the status of your computer. With this tool, you can disable or enable protection from these vulnerabilities if necessary.
Some security devices especially Microsoft programs consider this executable file as a virus, but it is just the wrong alarm you can ignore.
No comments