Home › Blog › A Secret Operating System is Running Inside Your Computers
A Secret Operating System is Running Inside Your Computers
If this gives you a sinking feeling, it should. What most people don’t know is that, if your computer uses an Intel brand CPU, there is a hidden microprocessor dedicated to running a second operating system called MINIX. And MINIX is running right now.
That’s right. You have a second computer running inside each of your organization’s existing computers. And probably don’t know it.
An attacker’s dream come true:
-A scarcely known operating system
-Hidden in millions of computers
-Using a secret microprocessor
-With priority over everything else on the computer. Something IT Pros refer to as ring negative three.
-With network access
-Patching security flaws are a nightmare
-And there is no anti-virus
Even if the attackers don’t soon find a quick way to access sensitive information, they might find a way to shut down all of your servers. And keep them shut down.
Intel has great intentions. MINIX is part of Intel’s ME Management Engine that has desirable features. MINIX runs on, coexists with, Windows, Linux, or whatever you thought was the only operating system.
The most important thing for you, as an executive, to do is to make sure your IT Team is aware of MINIX. They can read more at www.zdnet.com/article/intel-weve-found-severe-bugs-in-secretive-management-engine-affecting-millions/
The race is on: Attackers are looking for ways to use MINIX to their advantage. Intel, Google, and others are working to find ways to make MINIX more secure.
Forward this message to any organizations that you care about, especially organizations upon which you rely to perform services and provide products to your own organization. If they get shut down, or infiltrated, that will affect you too.
Posted by Mike Foster in Cyber Security, IT Security, MINIX, Operating Systems, Ring Potential Three on November 28th, 2017.
Tags: cyber security, Cyber Security Best Practices, Cyber Security Breach, Cyber Security Consultant, Cyber Security Tips, hackers, Internet Safety Tips, it best practices, IT network security, IT pros, it risk management, it security audit, IT security consultant, it security expert, IT security procedures, it security review, IT security training, minix, os, ring negative three, risk management, second operating system, secret operating system, Security expert, tech support
Leave a Reply
- Watch Mike on YouTube
- Follow @safenetwork
- Join Mike on Facebook
- Connect with Mike Foster
- Subscribe to the Blog
Recent Blog Posts
- New York City is Providing Automatic Protection for all iPhone Users, and So Can Your City
- A New Opportunity for Your IT Pros to Protect your Servers
- How Buying a Spare Printer can Vastly Improve Your Cyber Security
- When Trusted Programs get Hacked: An Attacker May Be Putting Germs on Your Toothbrush
- Patching Nightmare – Please Forward to Your IT Pros
- Three Serious Trends to Watch Out for in Cyber Security
- Major Flaw in Computer Processors Affects Security
- Protecting and Restricting iPads, iPhones, and Android Devices
Blog Topics
- Account Lockout Policy
- ACH Fraud
- Acronis True Image
- Adobe
- Adobe Flash
- AI
- Airport Safety
- Android
- Anti-virus
- Apple
- Apple Virus
- Application Updates
- Application Whitelisting
- Applying IT Patches
- Backup
- Best Practices
- Big Screen iphone
- Bitcoin
- Bitlocker
- Bromium
- browser security
- Carbon Copy Cloner
- CCleaner
- Children
- Cloud
- Computer Processor
- Credit Bureaus
- Credit Card Security
- Credit Freeze
- Customer Service
- Cyber Attacks
- Cyber Future
- Cyber Scams
- Cyber Security
- Cyber Security Breach
- Cyber Security Training
- Data Loss Prevention
- Data Restoration
- DEF COM
- Disaster Recovery
- Download
- Equifax
- Executive Tips
- Executives and IT
- Family Cyber Safety
- Fire Phone
- Firefox
- Firing IT Firms
- free wifi
- FTC
- Gmail
- Google Docs
- GoToMyPC
- Hacker Insight
- Hackers
- Hacking Competition
- Heartbleed
- High Sierra
- Home Computers
- hotspot
- hotspot safety
- Identity Theft
- Infected Apps
- International Security
- Invisible Security Threats
- iOS 11
- IT Best Practices
- IT Compliance
- IT Discussions
- IT Future
- IT Network
- IT Pay
- IT Pro Tips
- IT Professionals
- IT Security
- IT Settings
- IT Training
- IT Virus
- IT Workshops
- java
- Kasperski
- KRACK
- laptops
- LastPass
- Learn to Program
- Linux Patch
- Mac Protection
- Mac Virus
- MacBook
- Malware
- Microsoft Patch
- Microsoft Settings
- Mimecast
- MINIX
- mobile devices
- National Security Agency
- NIST
- NIST Recommendations
- NSA
- NYC Secure
- Online Impersonators
- Online Security
- Operating Systems
- Outsourced IT Firms
- Outsourcing IT
- password
- Password Manager
- Password Safety
- Password Security
- Patch Release
- Patch Updates
- Patches
- Petya
- phones
- Preventative IT Mainenance
- Preventative IT Security Breach
- Programs
- Project Management
- Pwn2Own
- Ransomware
- Remote Workers
- Restoring
- Ring Potential Three
- RSA
- Save time
- Scratch
- Security Breach
- Security Logs
- Shadow Protect Desktop
- Sir Michael Fallon
- social media
- Solid State Drives
- Spam
- Spam Phishing
- SSD
- Stolen Data
- Student Cyber Security
- SuperTech 2015
- SuperTech 2016
- surface pro
- Targeted Threat Protection
- TeamViewer
- Technology
- Technology Distractions
- Technology Safety
- Technology Safety Tips
- Technology Security
- Technology Tips
- Threat Protection Software
- touch screen
- Troubleshooting
- Turkish Crime Family
- two set logon
- two step login
- UK
- Uninstall
- Upgrade
- Videos
- VirtusTotal.com
- Virus
- WDAG
- Website Security
- Whitelisting
- wi-fi best practices
- wi-fi safety
- wi-fi security
- Windows 10
- Wire Transfer Fraud
- Working with IT
- Workplace Safety
- Workplace Shooter
- Yahoo