![]() ![]() ![]() ![]() Recommended steps to patch Meltdown/SpectreĪccording to Microsoft, here are 3 recommended steps to help protect against the vulnerabilities. Not only that, it’s also a very complicated technical issue that many tech-savvy people were having a difficult time to wrap their heads around it.Īnd that’s why I really like this simplified version by CloudFlare that explains the Meltdown/Spectre Bugs for a Non-Technical Audience.įor those who also would like to learn it more technically, there’s a paper on Meltdown and a separate one on Spectre. I won’t go into details explaining what it is and how it works because there are already plenty of materials out there that will help you understand them in depth. That gives us a few breath moments to get all our systems patched up so no sensitive information will be leaked because of these side-channel attacks when they arrived. The good news is that there is no reported incident indicating that these serious vulnerabilities have been used to attack end users, at least at this very moment. The affected chips include those manufactured by Intel, AMD, and ARM, which literally means that all devices that run Windows platform are potentially vulnerable, including desktops, laptops, cloud servers, and smartphones. Meltdown and Spectre, arguably the biggest vulnerabilities discovered in modern computers to date, are the flaws in the processor level and to affect almost every chip sold in the last 20 years. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |