UXDE dot Net

Windows 8 PCs vulnerable to cyber threats, warns German agency

By -

Windows 8 has appealed the audience with its innovative and user-friendly features and is compatible with all the platforms. For security reasons, Windows 8 has integrated the Trusted Platform Module, or TPM 2.0 (computer chip) that is specially design to protect your PCs from threats. This computer chip interacts with a wide range of security applications and also offers high encryption performance required for today’s applications. Moreover, this chip informs other applications that the computer is in a known state, making it useful for applications like banking software. You are assured that no potential intruders or spywares are trying to steal your personal information or password.

windows 8 security problem

This Trusted Platform Module enables your PC to authenticate itself to the network as well as allows you to authenticate yourself to the PC, eliminating the chance of unauthorized access. The Trusted Platform Module was developed by Trusted Computing Group and was supported by technology companies such as Intel, IBM, Microsoft, and Hewlett-Packard.

According to the BSI or the Germany’s Federal Office for Information Security, the deal between Windows 8 and Trusted Platform Module can lead to loss of control to both the operating system and hardware. This can further give rise to new risks and can be harmful for users including federal and critical infrastructure. What’s more, this risk can be dangerous and can be misused by third party applications. This warning has been flashing after the leaks related to the United States surveillance programs. This organization has warned the German agency to be more aware as the new security technology can actually make PCs more vulnerable and give rise to cyber threats.

The company then came up with a statement saying that the PC makers can turn off the TPM technology and customers can buy PCs with the technology being disabled. This will help them to secure their critical information and prevent them from any unauthorized use. What’s more, the BSI also said that it is trying to find a solution to resolve this problem and is working together with the Trusted Computing Group.

 

Satyakam

You can find Satyakam on , and .

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>