The cat is officially out of the bag. In essence some Antivirus makers are taking advantage of the bug. This implies that it's been going on for a long time.
For cynics like me this is just another case of a "Back Door" gone bad.
Some Antivirus programs are giving BSOD which happens now when User Programs access System Memory.
To: visualops
ping to ya.
Perhaps this is the reason malwarebytes started acting up?
2 posted on
01/04/2018 10:06:52 AM PST by
TheStickman
(#MAGA all day every day!)
To: ImJustAnotherOkie
I would not be surprised if this was just fake news to get people to dump their old PC’s.
Meanwhile, I’m all AMD except for one old Pentium recording studio computer that never sees the internet. So I’m good...
3 posted on
01/04/2018 10:07:36 AM PST by
robroys woman
(So you're not confused, I'm male.)
To: ImJustAnotherOkie
Microsoft says it was necessary to delay the update on these systems to avoid Blue Screen of Death errors that would leave the device unable to boot.Ah, 'fail-safe' -- can't boot, won't be exploited whilst online. At least, you'll have a secure doorstop...
6 posted on
01/04/2018 10:16:23 AM PST by
DJ Frisat
(Hey, what happened to my clever tag line?!)
To: ImJustAnotherOkie
It does not necessarily follow that any program is using the vulnerability.
This issue could be with what the antivirus programs prevent in the form of changes by Windows, of which the latest patches may address microcode updates Microsoft would never put on a system (usually separate BIOS or Intel update), because they may have to go on before Microsoft can safely reference them.
8 posted on
01/04/2018 10:17:37 AM PST by
ConservativeMind
(Trump: Befuddling Democrats, Republicans, and the Media for the benefit of the US and all mankind.)
To: ImJustAnotherOkie
It’s the Russians trying to get Hitlery.
13 posted on
01/04/2018 10:21:23 AM PST by
fella
("As it was before Noah so shall it be again,")
To: ImJustAnotherOkie
Are any of these “vulnerabilities” actually being exploited as of this date? And by whom?
Or is this an attempt by the chip makers and OS firms to force some hardware/software turnover through scare tactics?
How many of these “vulnerabilities” are actually discovered outside of an OEM R&D department?
15 posted on
01/04/2018 10:23:44 AM PST by
factoryrat
(We are the producers, the creators. Grow it, mine it, build it. MAGA!)
To: ImJustAnotherOkie
Somewhat off topic but the Windows “Creator” update in November, knocks out sleep mode where coming out of sleep turns off the computer. Many threads on this at MS but no real solutions.
19 posted on
01/04/2018 10:33:03 AM PST by
Kent C
To: ImJustAnotherOkie
Emergency Windows Meltdown patch may be incompatible with your PC. Typical Microshaft business practice.<>How can I know if my particular Win10 laptop and desktop are vulnerable or infected?
22 posted on
01/04/2018 10:45:57 AM PST by
publius911
(CBS: "Asking the right questions is 100% of catching sexual abusers")
To: ImJustAnotherOkie
And they want driverless cars that rely on these chips?
32 posted on
01/04/2018 12:05:34 PM PST by
dfwgator
To: ImJustAnotherOkie
What is the Microsoft patch number?
To: ImJustAnotherOkie
35 posted on
01/04/2018 1:46:38 PM PST by
Sergio
(An object at rest cannot be stopped! - The Evil Midnight Bomber What Bombs at Midnight)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson