Microsoft released Security Advisory 18002 on Wednesday, January 3, 2018 to mitigate a major vulnerability to Windows in modern CPU architectures. ESET released Antivirus and Antispyware module 1533.3 the same day to all customers to ensure that use of our products would not affect compatibility with Microsoft’s patch.
The first few days of 2018 have been filled with anxious discussions concerning a widespread and wide-ranging vulnerability in the architecture of processors based on Intel’s Core architecture used in PCs for many years, as well as processors from AMD, and even affecting ARM processors commonly used in tablets and smartphones.
The good news is that ESET can help protect against the types of malware that could take advantage of these vulnerabilities.
And, ESET was one of the very first security vendors to allow the Microsoft patch against the flaw to be enabled.
While ESET protects against potential malware infection, you should also take these steps to secure your computers and data:
- Make sure your browser is up to date. For Chrome or Firefox users:
- Mozilla has released information describing their response, including how Firefox 57 will address these security flaws.
- Google has stated, “Chrome 64, due to be released January 23, will contain mitigations to protect against exploitation.” In the meantime, you can enable “Site Isolation” found in current stable versions of Chrome to provide better protection.
- Make sure you update your ESET software, then update your Windows OS to protect against this exploit. To update ESET:
- Customers should review ESET’s Knowledgebase article for important updates.
- See this great collection of tips, articles and recommendations from the Google Project Zero team.
- If you have a cloud-based server or have a website hosted by hosting provider, check to see what mitigations they have implemented already to prevent Meltdown.