Meltdown and Spectre, major hardware security weaknesses have afflicted modern processors

A major cybersecurity and safety flaw have impacted nearly all computers, phones, servers and other devices all over the world. Security Experts from Google has detected the two serious defects, now referred to as “Meltdown” and “Spectre” have affected the modern Intel chipsets leading to severe Kernel memory spill problems on the modern devices and computers operating on Windows, Linux, macOS platforms. Although the root cause of this defect and bug issue continues to be a conundrum, various companies like Windows, Linux etc have initiated releasing upgrades to resolve the problem. The striking procedures of Meltdown and Spectre resemble the methods used by malicious parties to crack into some of the most delicate areas and functioning of any system through the infected CPUs. These microprocessors bugs enable programs to seize currently processing data files on the devices.


In accordance with a statement released by the Graz University of Technology, the security experts have discovered three possible strike patterns namely Meltdown and two other vulnerabilities together referred to as Spectre. Spectre collapses the isolation between the several applications and permits a hacker to cheat the programs those are error-free to ooze their information whereas Meltdown cracks the most crucial isolation between the Operating System and user programs allowing the programs gain access to the memory and fully grasp the information.

Windows and Linux are already working on their patch upgrades and its release, At the same time Apple did not respond to this issue or made statements concerning Meltdown and Spectre assaults. Yet the security expert Alex Ionescu has shared oh his twitter that the Mac Operating System 10.13.2 upgrade will handle this vulnerability. Microsoft has made a press release to point out that almost all of the Azure system has been upgraded to handle this particular weakness. They also said that certain things continue to be getting upgraded and will require a reboot of the user VMs for the upgrade to start working.

Source Meltdownattack Twitter/aionescu

Comments are closed, but trackbacks and pingbacks are open.