{"id":11001,"date":"2018-01-04T08:30:13","date_gmt":"2018-01-04T16:30:13","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/01\/04\/news-4772\/"},"modified":"2018-01-04T08:30:13","modified_gmt":"2018-01-04T16:30:13","slug":"news-4772","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/01\/04\/news-4772\/","title":{"rendered":"Apple acts as digital transformation hits panic mode"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.techhive.com\/images\/article\/2017\/03\/internet_security_privacy-100715273-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Thu, 04 Jan 2018 08:03:00 -0800<\/strong><\/p>\n<p>Apple is <a href=\"http:\/\/www.applemust.com\/how-to-fix-apples-high-sierra-security-flaw-using-terminal\/\" rel=\"nofollow\">updating its systems<\/a> against newly revealed <a href=\"https:\/\/www.wsj.com\/articles\/tech-giants-race-to-address-widespread-chip-flaws-1515070427?mod=pls_whats_news_us_business_f\" rel=\"nofollow\">Spectre and Meltdown vulnerabilities<\/a>, but it\u2019s not enough to update personal devices \u2013 what about older PCs and the millions of servers that may also be vulnerable to the bug?<\/p>\n<p>The Spectre and Meltdown bugs are causing lots of distress. Meltdown impacts Intel processors, while Spectre appears to threaten chips from AMD and ARM as well. A good explanation of these vulnerabilities is <a href=\"https:\/\/techcrunch.com\/2018\/01\/03\/kernel-panic-what-are-meltdown-and-spectre-the-bugs-affecting-nearly-every-computer-and-device\/\" rel=\"nofollow\">here<\/a>.<\/p>\n<p>My over-simplified understanding follows:<\/p>\n<p>As I understand it, attacks based on these flaws can\u2019t take place across the Internet.<\/p>\n<p>\u201cIt is important to note that this method is dependent on malware running locally which means it\u2019s imperative for users to practice good security hygiene by keeping their software up-to-date and avoid suspicious links or downloads,\u201d ARM said.<\/p>\n<p>In other words, in order to use Meltdown or Spectre to undermine security on a Mac, iPhone or thermostat, the attacker needs to be physically with the target system.<\/p>\n<p>Big tech got informed of the flaws a few weeks ago.<\/p>\n<p>Apple has already upgraded Mac security against the flaws and is thought to be preparing another upgrade for its systems. Intel\u2019s CEO courted controversy by selling Intel shares after the company was <a href=\"http:\/\/www.computerworld.com\/cms\/article\/Apple%20acts%20as%20digital%20transformation%20hits%20panic%20mode\">made aware of the problem last year<\/a>.<\/p>\n<p><em><a href=\"https:\/\/9to5mac.com\/2018\/01\/04\/cpu-bug-iphone-ipad-ipod-apple-tv\/\" rel=\"nofollow\">9to5Mac<\/a><\/em> speculates that iPhones 4 \u2013 5 and first, second and third generation iPads may be susceptible, but it\u2019s important to stress that we don\u2019t actually have all the details we need in order to figure out the magnitude of the problem, and its impact on the Mac.<\/p>\n<p>We have been told the flaws may impact devices as far back as those released in 1995.<\/p>\n<p>What we don\u2019t know is for how long the existence of the flaws has been known.\u00a0Discovery in the public interest doesn\u2019t necessarily mean these flaws weren\u2019t already known elsewhere.<\/p>\n<p>The danger of these flaws is that they provide a nice route to undermine security \u2013 and while that\u2019s bad for our personal devices (which do include some older iPhones), it\u2019s really bad for any old and hardly-ever-updated PCs connected to the network.<\/p>\n<p>While most end users can probably expect to receive software patches to proof their systems against the flaw (eventually), the vulnerability also impacts servers. What are those servers doing?<\/p>\n<p>They might be:<\/p>\n<p>In comparison with the widely discussed Heartbleed and Shellshock attacks, Spectre\/Meltdown reflect decades of a deep vulnerability being in existence.<\/p>\n<p>What makes this really concerning is that most reports claim that these flaws have existed for a long time. This means that if any malicious entity was previously aware of these vulnerabilities they will have been able to access a huge quantity of data, without oversight, regulation, protection, permission or control. No one knows if these flaws have been exploited in this way.<\/p>\n<p>The other problem is lack of protection for older systems. Those Windows XP systems are still firmly entrenched across enterprise IT. News that Macs, PCs, iPhones and other solutions are vulnerable to these exploits is far from reassuring.<\/p>\n<p>Sure, we\u2019ll handle the minor inconvenience of a software upgrade \u2013 but what about those older devices? How quickly will SME\u2019s who happen to hold confidential client data update their systems? Will manufacturers even update veteran systems that are still widely used despite being declared end-of-life? What control does anyone who has entrusted their data to a third-party have that the data controller will act swiftly and intelligently to quickly patch their systems? \u00a0What about those iCloud servers? What\u2019s the status of AWS servers?<\/p>\n<p width=\"100%\" height=\"420\"><iframe loading=\"lazy\"  src=\"https:\/\/www.youtube.com\/embed\/5ELQ6u_5YYM\" width=\"100%\" height=\"420\" frameborder=\"0\" ><\/iframe> <\/p>\n<p><iframe loading=\"lazy\"  src=\"https:\/\/www.youtube.com\/embed\/5ELQ6u_5YYM\" width=\"100%\" height=\"420\" frameborder=\"0\" ><\/iframe> <\/p>\n<p>While it makes utter sense to remain <a href=\"https:\/\/www.computerworld.com\/article\/3243011\/apple-and-cisco-just-improved-security-in-the-ios-enterprise.html\">resolutely secure when using any computing system<\/a>, flaws like these are extremely dangerous. It really isn\u2019t my intention to be alarmist, but these new security flaws raise questions that matter a huge amount today but will matter even more tomorrow.<\/p>\n<p>Apple, Google, Facebook, IBM and all the other big tech companies like to spend lots of their time talking about digital transformation, the melding of technology within every aspect of human experience.<\/p>\n<p>The vision they have reaches far beyond the \u201ctech on the cheap\u201d small-minded vision of the UK government, and is much more in tune with more all-encompassing national strategies.<\/p>\n<p>As everything is digitized, the responsibility to ensure data is kept safely and securely can only increase. This means the big tech firms who mutter these big digital transformation promises must be held to account for any failure to ensure effective protection.<\/p>\n<p>The Spectre research paper tells us that these flaws exist in part because the tech industry is focused on performance, which means the many elements (from OS to processor, drivers, components and more) that make a computer system, \u201chave evolved compounding layers of complex optimizations that introduce security risks.\u201d<\/p>\n<p>They warn:<\/p>\n<p>\u201cAs the costs of insecurity rise, these design choices need to be revisited, and in many cases alternate implementations optimized for security will be required.\u201d<\/p>\n<p>Otherwise we\u2019re likely to find ourselves living through an episode of Black Mirror. Perhaps, we already are.<\/p>\n<p><strong>Google+?<\/strong>\u00a0If you use social media and happen to be a Google+ user, why not\u00a0join\u00a0<a href=\"https:\/\/plus.google.com\/u\/0\/communities\/102592251674546201152\" rel=\"nofollow\">AppleHolic&#8217;s Kool Aid Corner community<\/a>\u00a0and get involved with the conversation as we pursue the spirit of the New Model Apple?<\/p>\n<p><strong>Got a story? Please\u00a0<\/strong><a href=\"https:\/\/twitter.com\/jonnyevans_cw\" rel=\"nofollow\">drop me a line via Twitter<\/a>\u00a0and let me know. I&#8217;d like it if you chose to follow me there so I can let you know about new articles I publish and reports I find.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3245767\/apple-mac\/apple-acts-as-digital-transformation-hits-panic-mode.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.techhive.com\/images\/article\/2017\/03\/internet_security_privacy-100715273-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Thu, 04 Jan 2018 08:03:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Apple is <a href=\"http:\/\/www.applemust.com\/how-to-fix-apples-high-sierra-security-flaw-using-terminal\/\" rel=\"nofollow\">updating its systems<\/a> against newly revealed <a href=\"https:\/\/www.wsj.com\/articles\/tech-giants-race-to-address-widespread-chip-flaws-1515070427?mod=pls_whats_news_us_business_f\" rel=\"nofollow\">Spectre and Meltdown vulnerabilities<\/a>, but it\u2019s not enough to update personal devices \u2013 what about older PCs and the millions of servers that may also be vulnerable to the bug?<\/p>\n<h2><strong>The bigger picture<\/strong><\/h2>\n<p>The Spectre and Meltdown bugs are causing lots of distress. Meltdown impacts Intel processors, while Spectre appears to threaten chips from AMD and ARM as well. A good explanation of these vulnerabilities is <a href=\"https:\/\/techcrunch.com\/2018\/01\/03\/kernel-panic-what-are-meltdown-and-spectre-the-bugs-affecting-nearly-every-computer-and-device\/\" rel=\"nofollow\">here<\/a>.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3245767\/apple-mac\/apple-acts-as-digital-transformation-hits-panic-mode.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11078,10480,714],"class_list":["post-11001","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple-mac","tag-ios","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11001","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11001"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11001\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11001"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11001"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}