Cyber Security Expert, Paulius Petretis Talks About Security Holes in Intel Platforms

Paulius Petretis, leading cyber security expert and CEO of VORAS Consulting reveals that all Intel platforms for the past decade are vulnerable due to remotely and locally exploitable security holes.

 Vilnius, Lithuania – May 15, 2017 – Paulius Petretis, CEO of VORAS Consulting posted a new blog on the company website entitled “If You Use Intel Platforms Your Data Is Vulnerable.” Cyber security threats are not surprising to Mr. Petretis, however when an OEM is made aware of a threat and does nothing to fix it, he is surprised.

Petretis writes, “In the world of cyber security new threats are discovered literally on a daily basis. Typically, though, in the digital world issues are addressed quickly once they are discovered. Well, some of the time.” He continues adding, “Apparently that is not the case with Intel platforms produced over the past decade.” He elaborates, “I came across an article at SemiAccurate.com, a technology news site I subscribe to that took me somewhat by surprise.”

“According to the article,” says Petretis, “Every Intel platform from Nehalem to Kaby Lake has a remotely exploitable security hole. There is literally no Intel box made in the last 9+ years that isn’t at risk.” HE adds, “I agree with the author’s next statement that, “This is somewhere between nightmarish and apocalyptic.” (https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/)

Petretis states, “It’s likely you have vulnerable Intel platforms with exploitable security holes that need to be secured if your system is 10 years old or newer.” He advises, “The best course of action is to check for patches daily and install all patches immediately. If there is no patch, back up data and replace.”

The entire blog can be read at https://voras-consulting.com/if-you-use-intel-platforms-your-data-is-vulnerable/

 

Paulius Petretis

Paulius Petretis is an Information security expert, Certified Information Systems Security Professional (CISSP®), Certified Information Security Manager (CISM®), Certified Information Systems Auditor (CISA®), Certified in the Governance of Enterprise IT(CGEIT®) and Certified in Risk and Information Systems Control (CRISC®), Guest speaker at various conferences and seminars, Trainer at information security related training courses.

According to the annual survey initiated by the Info Security Europe, a whopping 93% of large organizations and 76% of small businesses had at least a single information security breach in 2011. Only 18% of the organizations affected by the infringements related to data protection laws had a consistent and effective contingency plan in place. According to Paulius, information is not something static – it evolves and mutates every day. It is the ecosystem of every business and if a single cell fails, it can bring down the entire business.

Therefore ensuring a consistent and up-to-date information protection policy must be the priority for all businesses – no matter how big or small they are. As it might be unrealistic to believe that any young or experienced entrepreneur can be the jack of all trades, the really smart decision is to rely on specialists who dedicate their professional lives to getting to know everything there is to know about protecting important business information.

With more than 16 years of experience in helping people, small businesses, and government organizations to protect their business secrets, Paulius believes that information security must help businesses achieve goals but not vice versa.

###