Responding to the Spectre and Meltdown Vulnerabilities
Two new vulnerabilities called Meltdown and Spectre, or speculative execution side-channel vulnerabilities, have been discovered in modern processors that allow malicious programs to steal information from the memory of other programs. This means that the malicious program can steal passwords, account information, encryption keys, or theoretically anything stored in the memory of a process.
Vendors have started to release information on how customers can protect themselves from Spectre or Meltdown and the status of their services. To make it easier for FinTech vendors, BDs/IAs, and Financial Advisors to respond, we have created this page and will be adding links to advisories as they are released
CLEVERDOME RESPONDS / GUIDANCE FROM FINANCIAL COMPUTER:
FINANCIAL COMPUTER STEPS TO PROTECT YOUR ENDPOINTS:
- Backup everything!
- Understand endpoint vendor version issues and what to do with registry key
- Update endpoint protection
- Set registry to accept the patch and implement the patch
- Update the power shell
- Update the bios
Useful Links:
- Amazon AWS: Recommended Customer Action
- Microsoft Windows
- RedHat Enterprise Linux
- SuSe Linux
- Ubuntu Linux
- Azure
- Financial Computer