Skip to main content
HomeThe Web Writer Spotlight

- News, tips, inspiration you can trust to thrive in today’s digital age.

Search form

Main menu

  • Home
  • News & Features
  • Business & Economy
  • Tech & Trends
  • Health & Style
  • Arts & Culture
  • Contact Us
 

How to Protect Your PC from the ZombieLoad Attack

Sean Williamson June 3, 2019
man-in-front-computer-covering-his-face-with-his-hands-zombieload-hacker-attack

Researchers discovered a set of frailties in Intel’s processors that can allow potential malicious hackers to retrieve data from CPUs.

ZombieLoad, also technically known as CVE-2018-12130 as disclosed by Intel, is a chip flaw, which might result in leaking secrets. It lies in the same category of side-channel attacks as Meltdown and Spectre did back in 2018.

Researchers from the Graz University of Technology first discovered the flaw and later disclosed it to Intel. This flaw affects all the Intel chips made since 2011. As a result of this intimation, Intel has issued a code to fix this flaw which is yet to be implemented by individual manufacturers and then installed by individual users.

Intel has graded the severity of this attack as “medium”. Whereas researchers claim that, it is far more serious than stated.

Zombie Loads are huge amounts of data that a CPU cannot deal with, without crashing. These Loads come with microcode that prevents the PC from crashing. These Loads may contain sensitive data and the flaw in Intel chips may allow this information to be read by unauthorized entities.

 

Attack Overview

 

ZombieLoad itself is an offbeat category of the side-channel attacks. These invasions also referred to as data-sampling attacks, have opened a completely new field of research for the folks in academia.

ZombieLoad thrives on the fact that the fill buffer is accessible by all logical CPUs and it doesn’t recognize privileges yet. Hence putting a great amount of sensitive data at risk. Owing to the fault in Intel microchips, the data load asks for a microcode to assist it. This leads the load to sensitive information for a while before it is directed back to where it was intended to go.

Apple, Google, and Microsoft announced the availability of updates recently. Hence, ZombieLoad isn’t the kind of flaw someone is imminently at risk from.

Make sure your internet provider offers a reliable internet connection to download these updates timely.  After the updates, a potential attacker won’t be able to exploit ZombieLoad remotely. They’ll have to run a code on the targeted machine to be able to access its data.

 

 Monitoring Browsing-Behavior

 

ZombieLoad is capable of detecting certain byte sequences within the loaded data. For example, an unprivileged attacker, using a different machine can leverage ZombieLoad to screen a browsing session. Researchers haven’t yet confirmed any malicious activity on this flaw.

  • Keyword Detection: Keyword detection lets the attacker determine the type of information a victim is consuming based on the keywords used in a certain browsing session.
  • URL Recovery: In this kind of attack, hit and trial method is used to determine the domains that are repetitively visited by the victim. Hence helping the attacker learn about their browsing behavior. This kind of attack is not just restricted to web domains, but it can also lead to other predictable entries like credit-card numbers and session cookies.

“Experts say that trying to protect yourself from ZombieLoad can result in performance losses of up to 40% initially.”

 

How to Solve It?

 

ZombieLoad, as much as the authorities are downplaying it, is still a threat to sensitive information. Mitigating this issue is the need of the hour. I have listed some ways to fix this issue for each kind of operating system. I’ll keep updating the list as new solutions come out.

 

ZombieLoad Fix for Android Devices

 

Although most Android devices run on ARM hardware and will not be affected by ZombieLoad directly. However, any Android device using Intel Hardware will need to install patches issued by the hardware manufacturer.

Check their websites or Twitter to get the latest updates on the release dates of these patches.

 

 ZombieLoad Fix for Windows PCs

 

Windows PCs are the ones that are going to be affected the most by this attack, Including Windows 10, 7 and XP computers. On the brighter side, Microsoft has already released an update that should download automatically to your computer. However, check the latest windows update, just to be sure.

You can also download the fix from Microsoft’s support website.

 

ZombieLoad Fix for Mac Users

 

Apple has also released a patch to mitigate ZombieLoad that brought all the MacBooks, released since 2011, under threat.

However, the application of all these patches on Macs may result in a 40% fall in the performance. We really expect that Mac and Intel come to terms to reduce this performance fall to a bare minimum.

 

Fix ZombieLoad for Linux

 

Red Hat had developed security updates for products, which may result in performance issues but are capable of mitigating the bigger issue at hand. Until the time these performance issues are catered to, keep the app installed in your devices.

 

How to Protect Firefox and Chrome Against ZombieLoad?

 

Mozilla in its statement said that Firefox Beta and Firefox Nightly already have these patches installed. Whereas Google advised Chrome users to update their Operating System to avoid any inconvenience.

In short, if you are someone who is concerned about his data security, one quick solution is installing all the latest updates of your operating system. Most OS do it automatically, whereas others might require you to update manually, depending on your system settings.


Sean Williamson lives in New York City and calls himself the 'tech-bro', given his special interest in everything that's digital. He works as a writer in a company named Local Cable Deals. Find him on his social profiles: Twitter, Tumblr, and Pinterest. 


 

Related stories

 

Boost Your Computer's Performance for Increased Productivity

How Some Websites Secretly Hijack Your PC to Generate Revenue Online

Simple Ways to Keep Your Client Accounts Safe from Cybercrime

The Best Ways to Keep Your Online Transactions Secure

The Perfect Security Plan for Your Business

Major Facebook Hacking Highlights Risk of Using Social Networks to Login to Other Sites

Apple Apps Secretly Record People’s Screens Without Permission

How to Make Your Mobile Device & Software Run Quicker

 

Share this article

  • facebook
  • twitter
  • linkedin
  • pinterest
  • pocket
  • email
  • hackernews
  • reddit
  • tumblr
  • whatsapp

bg_carousel_header_0.png

SUBSCRIBE TO OUR NEWSLETTER  newsletter icon.png

Get our best content, tips, and inspiration free in your inbox. Subscribe here >>

bg_carousel_header_0.png

 

You might also like...

7 Reasons to Consider Sedation Dentistry on Your Next Dental Appointment

Artificial Intelligence Is Set to Revolutionize These Key Industries

15 Things You Can Do Right Now to Stay Motivated and Positive as an Entrepreneur

Top 10 UK Cities with the Most Outdoor Pubs and Restaurants

Image for Boris Johnson Bans Petrol and Diesels, But the Future’s Bright for Electric

Boris Johnson Bans Petrol and Diesels, But the Future’s Bright for Electric

golang_programming logo

Why GoLang Is One of the Best Programming Languages Today

 

Join over 20,000 Subscribers!

And get our best content, news, tips, and inspiration free in your inbox. Subscribe ››

twitter.gif linkedin-gray.jpg email.gif RSS feed

 

 

 

 

 

 

Most read this week


Pizza Ordering System - Image for Best Pizza Ordering Systems
8 Best Pizza Ordering Systems (& Tips to Choose Your POS System)
Archana Inani

people-audience-event-find-your-target-market
How to Find Your Target Market & Connect with the Right Audience
Mike Austin

asian-woman-looking-ahead-power-language-index
10 Most Powerful Languages in the World Ranked
Jonathan Brown

The Healthiest Cities to Live in the UK REVEALED!
George Mathews

 

Got a story or tip for us?

 

Tips_0_0_0.png

Here's how to submit it →

 

 

 

Like this content? Never miss a story!

Get our best content, tips, and inspiration free in your inbox.

CAPTCHA
Please check this box to prove you are a human visitor and help us prevent automated spam submissions.
 

New stories


Top Link Building Techniques and Tips for Marketers

Vergis Eva September 23, 2023
LINK BUILDING
serious-bearded-man-using-laptop-cafe-link-building

No matter what you are doing to boost your business website, link building is something you cannot avoid. Leverage the right link building strategies and marketing tactics to build quality links.

How to Spy on Your Competitors and Steal Traffic Ethically

Marc Sullivan September 22, 2023
WEBSITE TRAFFIC STRATEGY
man-using-binoculus-spy-on-competitors-steal-website traffic

Want to increase traffic to your website? You can spy on your competitors' website traffic and ethically steal some traffic. Spy website traffic for competitor analysis and traffic growth replication.

Ransomware Defense: Safeguarding Your Data with Backup Protection

George Mathews September 22, 2023
MALWARE DEFENSE
cyber-criminal-wearing-white-mask-guard-agains-malwake-back-up-data
Becoming a victim of ransomware is more probable than you might think. You need to backup your data and implement ransomware defense strategies to safeguard your data and protect yourself from malware.

Evolution of the Transport Sector: Key Changes Worth Noting

George Mathews September 21, 2023
TRANSPORT EVOLUTION
bullet-train-transport-sector-evolution-changes

From the new fastest planes for commercial air travel to widespread use of hydrogen fuel in vehicles, the transportation industry is changing and evolving faster than ever.

Unlocking the Power of Software-Defined Storage: A Comprehensive Guide

Alexis Davis September 21, 2023
DATA STORAGE SOLUTION
software-team-man-woman-software-defined-storage-concept
Many companies struggle with storage challenges like storage downtime, latency issues, and high software costs. SDS comes in handy to address these challenges, and more.

Marketing Funnels vs Customer Journey Maps: What You Should Know

Amanda DiSilvestro September 20, 2023
CUSTOMER JOURNEY MAP
man-whiteboard-marketing-funnel-customer-journey-map

The marketing funnel and customer journey map — or customer journey funnel — are similar ideas, but they mean different things and should not be used interchangeably.

3 Areas Businesses Invested in to Make it Through the Pandemic

Alicia Walker September 20, 2023
BUSINESS FOCUS & INVESTMENTS
man-office-wearing-covid-mask-pandemic-business-investments

For businesses that continued to operate throughout the pandemic and even post-Covid, investment in the right areas has never been more important.

Pagination

  • (Page 1)
  • Next page Next ›

Contributors blogs


Blog here »

Why Older Entrepreneurs Over 50 Years are Killing It in Business

Holly Klamer

 


Train Your Customers with eLearning to Boost Loyalty and Awareness

Suzanne Elly

 


How Music Benefits Your Brain, Heart & Physical Health

Steve Scott

 


How to Prevent Sleep Disorder at Home When Stuck in Lockdown

MJ Fernandez

 


Coronavirus: Global Economy Could Be in Recovery Mode within SIX MONTHS

George Prior

 


What Are NFTs? Non-fungible Tokens Explained

Hasnain Raza Khan

 


8 Best Tips for First-Timers Using Social Media to Grow a Brand

James Cummings

 


 

EXPLORE MORE ...

black-nav-bar1.png

News & Features ›


Publishers, Tech Giants Agree to Display Standardized 'Trust Indicators' to Help Readers Vet Stories Online

Yahoo Sued Over Mega Hack That Left at Least Half a Billion Accounts Breached

European Countries Rank Top of Countries MOST Interested in the Dark Web, Study Finds


The Present & Future Benefits of CRM Solutions - Salesforce Case Study

Will iPhone 15 ‘Wonderlust’ Event Help Apple Recover $200BN Lost?

Philippines' Rich History with Rum – A Dive into Sugar & Spirits

Mothers Are Less Wealthy Than Women Without Children, Study Finds

Painting Technicolor Futures with Innovation

UK Regions That Are Perfect for Stress-free Staycation

hor-line-light-blue.png

Tech & Trends ›


The Best Tech Careers and Jobs Today

businessman-woman-laptops-user-accounts-safe-cybercrime

3 Simple Ways to Keep Client Accounts Safe from Cybercrime

Say Goodbye to the 9 to 5: The Best Freelancing Jobs Right Now


Ransomware Defense: Safeguarding Your Data with Backup Protection

Unlocking the Power of Software-Defined Storage: A Comprehensive Guide

How To Increase Your App Downloads On Google Play Store & Other App Stores

Revolutionizing Industries: The Exciting Future of Metaverse & Predictions

Compatibility of Bitcoin with AI Attracting Institutional Investors

How to Choose Software Developers to Hire: Essential Tips
 

horizontal yellow line

Arts & Culture ›


How to Create Magnetic Web Content that Resonates with Readers

Kurt Vonnegut Image for 8 Memorable Creative Writing Tips by Kurt Vonnegut

8 Memorable Creative Writing Tips by Kurt Vonnegut

woman-reading-things-millennials-look-for-in-books

5 Things Millennials Are Looking for In a Book


Common Mistakes that Doom Writing Careers

Six Simple Tips to Overcome Wedding Speech Nerves

How to Overcome Uncertainty, Doubt, & Fear - the Bane of Creatives

5 Philosophical Ideas to Make You a Better Writer (& also a Better Person)

5 Best Books on Writing for When You Need to Be Inspired

How to Build a Strong Reputation Online As a Writer

hor-line-brn.png

Business & Economy ›


Benefits of Streamlining Logistics Operations with Transport Management System

men-exploring-map-treasure-hunting

Make Money Easily by Starting a Treasure Hunt Business

How I Earn Over $100,000 a Year As a Freelance Writer


Top Link Building Techniques and Tips for Marketers

How to Spy on Your Competitors and Steal Traffic Ethically

Evolution of the Transport Sector: Key Changes Worth Noting

Marketing Funnels vs Customer Journey Maps: What You Should Know

3 Areas Businesses Invested in to Make it Through the Pandemic

Applications & Benefits of Mass Text Messaging Services for Reaching Users

Home | About | Contributors | Write for Us | Advertise | Disclosure | Privacy Policy | Contact Us

Follow Us:

twitter_e.jpg linkedin-pg.jpg email-updates_icon.jpg

© 2023 Copyright, The Web Writer Spotlight.

Committed to quality content and journalistic ethics.

RSS rss

Search WWS search-icon-trans_0_1.png

Webwriterspotlight.com. All rights reserved.
x
x