<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>exploit Archives - Datarecovery.com</title>
	<atom:link href="https://datarecovery.com/tag/exploit/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description></description>
	<lastBuildDate>Tue, 16 Jan 2018 17:58:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Patches for Meltdown and Spectre Fix Flaws But Cause Slowdowns</title>
		<link>https://datarecovery.com/rd/patches-meltdown-spectre-fix-flaws-cause-slowdowns/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Tue, 16 Jan 2018 17:45:27 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[exploit]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5654</guid>

					<description><![CDATA[<p>Intel began the new year with the embarrassing announcement that researchers <a href="https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/">discovered vulnerabilities</a> built into most of the processors the company has built in the last two decades. The security flaws affect nearly everyone and could allow a hacker to...</p>
<p>The post <a href="https://datarecovery.com/rd/patches-meltdown-spectre-fix-flaws-cause-slowdowns/">Patches for Meltdown and Spectre Fix Flaws But Cause Slowdowns</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignright size-full wp-image-5656" src="https://datarecovery.com/wp-content/uploads/2018/01/intel-amd-arm-windows-macos2-327x272.png" alt="intel amd arm windows macos 327x272" width="327" height="272" srcset="https://datarecovery.com/wp-content/uploads/2018/01/intel-amd-arm-windows-macos2-327x272.png 327w, https://datarecovery.com/wp-content/uploads/2018/01/intel-amd-arm-windows-macos2-327x272-300x250.png 300w" sizes="(max-width: 327px) 100vw, 327px" />Intel began the new year with the embarrassing announcement that researchers <a href="https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/">discovered vulnerabilities</a> built into most of the processors the company has built in the last two decades. The security flaws affect nearly everyone and could allow a hacker to bypass security software to steal passwords and other crucial private data.</p>
<h3>Microsoft and Apple rushed patches for their operating systems to address the concern.</h3>
<p>Now that operating systems have been updated, researchers are talking more specifically about what the problems were. We know there were two major flaws— <a href="https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/">Meltdown</a> and <a href="https://www.cnet.com/news/spectre-meltdown-intel-arm-amd-processor-cpu-chip-flaw-vulnerability-faq/">Spectre</a>. Meltdown affects only Intel chips, while Spectre affects Intel, ARM, and AMD processors.</p>
<p>The Meltdown flaw could allow a hacker to use a low-privilege program to access files in a computer&#8217;s kernel —  the core of an operating system. Essentially, a rogue process (e.g. malware or JavaScript running in web browsers) could access and steal sensitive data like private files, passwords, and crypto-keys.</p>
<p>Spectre exploits a process called speculative execution, which speeds up computer processes by predicting what work needs to be done before it is requested. Hackers could potentially trick programs into reading private data, which modifies the data cache. If the hacker can then access the data cache, he could access that private data.</p>
<p>It&#8217;s important to note that these aren&#8217;t speculative threats; we&#8217;ve already seen several exploit tools on publicly available sites, which we won&#8217;t link here for obvious reasons.</p>
<h3>The security updates work great, except for one big problem.</h3>
<p>The patches for Meltdown and Spectre fix the problem and make the chips safe to use. Unfortunately, these fixes slow down computers. Intel admitted that chip performance would likely slow down by six percent (as much as 14 percent for some tasks).</p>
<p><a href="https://newsroom.intel.com/news/intel-offers-security-issue-update/">In a statement</a>, the company said, &#8220;the typical home and business PC user should not see significant slowdowns in common tasks such as reading email, writing a document or accessing digital photos.&#8221; However, the statement also says that the company will continue searching for solutions where patching causes &#8220;significant&#8221; slowdowns, admitting that the some will experience a more major impact.</p>
<h3>Has anyone actually exploited the Meltdown or Spectre vulnerabilities?</h3>
<p>One of the most disturbing aspects to the story is that a successful exploitation of these flaws would <a href="https://spectreattack.com">leave no trace</a>. That means that security experts don&#8217;t know if any hackers discovered and exploited this flaw before security experts fixed it.</p>
<p>We may never know for sure, but there&#8217;s good reason to believe it&#8217;s possible. Three independent teams discovered and reported Meltdown. Who&#8217;s to say a fourth team to didn&#8217;t discover it long ago and keep it a secret? After all, the flaw has existed for approximately 20 years, and we know that government organizations (like our NSA) <a href="http://www.washingtonexaminer.com/microsoft-shames-us-world-governments-for-stockpiling-vulnerabilities-after-massive-ransomware-attack/article/2623080">stockpile vulnerabilities</a> without reporting them.</p>
<p>Two teams independently discovered and reported the Spectre flaw. Again, there&#8217;s a distinct possibility that another team found it but kept it to themselves.</p>
<h3>The chip bugs have a wide-reaching impact.</h3>
<p>Just about <a href="https://www.pcworld.com/article/3245606/security/intel-x86-cpu-kernel-bug-faq-how-it-affects-pc-mac.html">everyone who owns a modern computing device</a> could be vulnerable to one or both of these bugs. While Meltdown affects only Intel chips, Spectre poses a risk to smartphones, laptops, desktops, and cloud servers.</p>
<p>To protect yourself against Meltdown and Spectre, make sure your operating system is updated. If there is a silver lining to these unfortunate discoveries, it&#8217;s the chance to remind the public of the importance of an up-to-date operating system.</p>
<p>To discuss penetration testing (PEN testing) services, call Datarecovery.com at 1-800-237-4200.</p>
<p>The post <a href="https://datarecovery.com/rd/patches-meltdown-spectre-fix-flaws-cause-slowdowns/">Patches for Meltdown and Spectre Fix Flaws But Cause Slowdowns</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DataRecovery.com Offers List of Solutions to Protect Against Flash Exploit in Internet Explorer</title>
		<link>https://datarecovery.com/2014/04/datarecovery-com-offers-list-of-solutions-to-protect-against-flash-exploit-in-internet-explorer/</link>
					<comments>https://datarecovery.com/2014/04/datarecovery-com-offers-list-of-solutions-to-protect-against-flash-exploit-in-internet-explorer/#respond</comments>
		
		<dc:creator><![CDATA[Ben Carmitchel]]></dc:creator>
		<pubDate>Wed, 30 Apr 2014 04:46:17 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">http://datarecovery.com/?p=2120</guid>

					<description><![CDATA[<p>April 30, 2014 &#8211; Edwardsville, IL &#8211; DataRecovery.com, a world leader in professional data recovery services, released a list of tips for personal computer users to protect against a recently discovered Adobe Flash exploit in Internet Explorer.<br />
The United States...</p>
<p>The post <a href="https://datarecovery.com/2014/04/datarecovery-com-offers-list-of-solutions-to-protect-against-flash-exploit-in-internet-explorer/">DataRecovery.com Offers List of Solutions to Protect Against Flash Exploit in Internet Explorer</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>April 30, 2014 &#8211; Edwardsville, IL &#8211; DataRecovery.com, a world leader in professional data recovery services, released a list of tips for personal computer users to protect against a recently discovered Adobe Flash exploit in Internet Explorer.</p>
<p>The United States Department of Homeland Security recently warned PC users against using Internet Explorer, as a bug discovered by FireEye Research Labs could allow a hacker to circumvent the security protections in various Windows operating systems. The hack uses Adobe Flash, a popular web browser add-on.</p>
<p>&#8220;Many users and small businesses are simply not using Internet Explorer to avoid the exploit, but this is not an effective solution,&#8221; said Michael Katich, Lead Programmer and Analyst at DataRecovery.com. &#8220;If Internet Explorer is your default browser, you&#8217;re one click away from a serious security risk.&#8221;</p>
<p>&#8220;Even if your default browser isn&#8217;t Internet Explorer, a hacker could still infiltrate your system,&#8221; Katich explained. &#8220;For instance, a program installed on your computer could instruct Internet Explorer to run, which could then allow unauthorized users direct access to your machine.&#8221;</p>
<p>DataRecovery.com offers the following solutions to the exploit:</p>
<ul>
<li>Disable the Adobe Flash Plugin in Internet Explorer. After clicking the Settings menu in Internet Explorer, click &#8220;Manage add-ons,&#8221; then find the Adobe Flash plugin and click &#8220;Disable&#8221;.</li>
<li>Uninstall Adobe Flash Altogether. Flash can be uninstalled through Windows’ Add/Remove Programs interface. As Flash is a commonly used program, this may be an unrealistic solution, but it&#8217;s a viable option for high-security systems.</li>
<li>Enable Enhanced Protected Mode in Internet Explorer 10 or Later. DataRecovery.com recommends keeping web browsers updated to prevent security issues. Newer versions of the browser have an enhanced protection feature, accessible through the Internet Options menu. On the &#8220;Advanced&#8221; tab, click &#8220;Enable Enhanced Protected Mode&#8221; to add an extra layer of protection to the browser.</li>
<li>Uninstall Internet Explorer. If you do not use Internet Explorer regularly, you can completely uninstall it. Go to Control Panel, click Add or Remove Programs, then click Turn Windows Features On or Off. Depending on your Windows version, you can then un-click Internet Explorer or select the program to uninstall it.</li>
<li>While these steps can protect against current versions of the exploit, DataRecovery.com also recommends regularly updating web browser software and avoiding potential security issues by using firewalls and third-party security programs to mitigate risks.</li>
</ul>
<p>Datarecovery.com is a world leader in data recovery and computer forensics. With four locations across the US and Canada, the company provides a variety of data recovery services to thousands of clients each year. Visit www.datarecovery.com for more information.</p>
<p><strong>Contact Information</strong></p>
<p>Datarecovery.com, Inc.<br />
Ben Carmitchel<br />
1-602-635-2020<br />
www.datarecovery.com<br />
Michael Katich 618-307-0070 ext.257</p>
<p>The post <a href="https://datarecovery.com/2014/04/datarecovery-com-offers-list-of-solutions-to-protect-against-flash-exploit-in-internet-explorer/">DataRecovery.com Offers List of Solutions to Protect Against Flash Exploit in Internet Explorer</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://datarecovery.com/2014/04/datarecovery-com-offers-list-of-solutions-to-protect-against-flash-exploit-in-internet-explorer/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 54/108 objects using Memcached
Page Caching using Disk: Enhanced 
Minified using Disk

Served from: datarecovery.com @ 2026-04-15 12:11:19 by W3 Total Cache
-->