IT security audit specialists report the launch of a new computer processor architecture that could redefine the way a system defends itself against cyber threats, leaving in the past the working model of periodic patch updates and corrections.
This new chip, called Morpheus, blocks potential cyberattacks by using encryption and randomly organizing the key bits of its own code about 20 times per second, surpassing by far the speed of any hacker or hacking tool developed so far.
“The current approach to correct security flaws should already be considered obsolete”, mentioned the IT security audit specialists. “New code is developed day by day, as long as this continues to happen, there will always be new bugs and vulnerabilities”, they added.
With Morpheus, even if hackers discover vulnerabilities, the information needed to exploit these failures will have disappeared from the target system in a matter of seconds. The first prototype of this processor successfully defended against all known flow attack variants; this is one of the most dangerous cyberattack techniques used by hackers.
This technology could be used for multiple purposes, from laptops, desktop PCs and even Internet of things (IoT) devices, which require more and better security measures every day.
“We all know the damage that these attacks can generate on a PC, but in the future an attack on smart locks, vehicles or smart home environments could be even more damaging,” the experts added. The developers are planning that Morpheus is easy to use for any software platform and end users, on the other hand, “it will be like an impossible puzzle to solve”, says project managers.
According to IT security audit specialists from the International Institute of Cyber Security (IICS), developers are already looking for funds to boost the marketing of Morpheus to the future. This could be the first “impossible to hack” processor.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.