eMazzanti Technologies Offers Updates to Patch Meltdown and Spectre Security Flaws

Chances are you own a smartphone or computer that contains a chip that hackers could potentially exploit to get access to sensitive information.

eMazzanti Technologies, a NYC area IT security consultant and MSP, issued emails over the weekend warning customers about the recently publicized Meltdown and Spectre security flaws that affect countless personal, business, cloud and mobile computer processors worldwide.

In the urgent communication, the company explains the nature of the Meltdown and Spectre vulnerabilities and countermeasures that software giants Microsoft and Apple are undertaking to prevent exploitation of the flaws. eMazzanti then offers to help customers “patch, backup, and install the latest software” to keep their environments up and running.

The email notice also provides a link to a Meltdown and Spectre technical analysis of what these two vulnerabilities could mean to a customer’s infrastructure.

“eMazzanti Technologies has been working tirelessly with our partners and hardware vendors to ensure that our client base has taken the appropriate steps to protect their data.,” stated Almi Dumi, Chief Information Security Officer, eMazzanti Technologies. “We urge customers with any questions or concerns to contact us by calling our service desk at (201) 360-4400 or submit a support request by email.”

Meltdown and Spectre Security Flaws Warning

Here is the text of the email warning:

“Chances are you own a smartphone or computer that contains a chip that hackers could potentially exploit to get access to sensitive information.

That’s because billions of devices are affected by two major security flaws revealed by cyber-security researchers on Thursday. The flaws, dubbed Meltdown and Spectre, affect processing chips made by Intel, AMD and ARM Holdings. That means if you use a desktop, laptop, smartphone or cloud service from Apple, Google, Amazon, or Microsoft you might be vulnerable!

It is important to note that the exploitation of either one of the vulnerabilities is virtually untraceable and almost impossible to detect. The attacks leverage technologies developed to improve performance on processors affecting millions using personal and cloud computing as well as mobile devices such as smartphones.

As a…

Read the full article from the Source…

Leave a Reply

Your email address will not be published. Required fields are marked *