What You Need to Know About Spectre and Meltdown

Security

The tech world is buzzing with the news of the newly announced Spectre and Meltdown vulnerabilities, and tech companies are rushing to produce patches.

So, what exactly does this mean for you?

Spectre and Meltdown are both security risks affecting modern microprocessors. This means that most of the devices from the past 15-20 years are affected, including your PC, smartphone, and others. These are bugs at a fundamental level that allow critical information stored deep inside your computer system, like passwords, to be exposed.

For the most part, your data cache has powerful protections in place to prevent other processes or applications from accessing it. Spectre and Meltdown circumvent those protections, and they have the potential to expose nearly any data the computer processes. This can include proprietary information and even encrypted communications.

Let’s talk about the differences between the two:

Meltdown affects primarily PCs and other Intel devices, but Spectre affects Intel, AMD, and ARM processors… which means it affects mobile phones, embedded devices, and pretty much anything with a processing chip in it, not just PCs.

Meltdown breaks through the protections that prevent applications from accessing random locations in kernel memory. Spectre, on the other hand, essentially tricks applications into disclosing information that would normally be inaccessible to other programs. This is a harder vulnerability to exploit, but it’s also a harder one to fix as it’s based on an established chip architecture practice.

Solutions are coming.

Based on testing, some are saying that you may experience a decrease in processing power (aka speed) once it does. For computers that already have a lot of processing power, you may not even notice a difference; but, for those older models, you may experience a decrease from 5-25%. This is still speculation, however, as patches are just rolling out now.

Are you confident in your current IT solution’s ability to roll out these changes?

If not, give us a call. Our team of experts would love to help.

Previous Post
Five Signs That You’ve Been Hacked
Next Post
Spectre and Meltdown vs. Virtual Desktops

Related Posts

No results found.

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.