Insights > Blog

Critical Vulnerabilities: Meltdown and Spectre

Meltdown and Spectre are critical vulnerabilities in modern processors. These processor vulnerabilities allow programs to steal data that is processed on the computer.

Meltdown and Spectre.jpg

A malicious program can exploit Meltdown and Spectre to get hold of sensitive data stored in the memory of other running programs.This might include your passwords stored in a password manager or browseryour personal photosemails, instant messages and even business-critical documents.

Meltdown and Spectre work on personal computers, mobile devices, and in the cloud. Depending on the cloud provider’s infrastructure, it might be possible to steal data from other customers.

How to Protect Yourself?

  • There are patches for Meltdown on Linux, Windows, and OS X.
  • There is also workaround to harden software against future exploitation of Spectre, respectively to patch software after exploitation through Spectre.

You may also find these resources helpful from various security advisories:

Other Helpful Meltdown & Spectre Resources

Free Security Assessment Tool

 
 
 
 
 
 
 
 
Did you enjoy this blog article? Comment below with your feedback.

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

GET EMAIL UPDATES

Information Security Maturity Self-Assessment Survey

Learn More

•  Whitepapers
•  E-books
•  Checklists
•  Self-Assessments
•  Webcasts
•  Infographics