Home Mobile Meltdown and Spectre CPU Exploits Explained

Meltdown and Spectre CPU Exploits Explained

Meltdown and Spectre CPU Exploits Explained

For those who haven’t seen anything about this yet, details of two new exploits that could enable malicious code on websites to trick your computer or mobile devices CPU into giving away private information such as website passwords have been made public.


Essentially the semiconductors industry has made a huge blunder and left a security design flaw in many CPUs such as are used in computers and mobile devices. It’s pretty serious – CERT The Cyber Emergency Response Team in the US originally recommended: “Throwing your CPU away and getting a new one” to be completely safe – they have now downgraded this advice to ‘apply updates’ which is much more helpful and realistic.


The exploits are known as Side-Channel-Analysis exploits and work by taking advantage of a feature within the CPU architecture whereby, during idle period, the CPU tries to speculatively pre-fetch (guess) what information is going to be requested next, that information is then held in a cache (temporary storage area) ready to be used – what sort of work you are doing will alter how much pre-fetching is going on.

Read the entire article here, Meltdown and Spectre CPU Exploits — Define Tomorrow™

Via the fine folks at ComputerWorld Group.

ComputerWorld Group The ComputerWorld team are the most knowledgeable business IT experts in the business. But what's really unique about our team is the personal approach and sheer determination of every single person to make businesses better. Our passion is really listening to problems and finding that eureka moment when when a technological solution will make a significant difference to the way an organisation operates.

Featured Resources:

Related Articles:


White Papers

    Application Lifecycle Management with Stratusphere UX – White Paper

    Enterprises today are faced with many challenges, and among those at the top of the list is the struggle surrounding the design, deployment, management and operations that support desktop applications. The demand for applications is increasing at an exponential rate, and organizations are being forced to consider platforms beyond physical, virtual and cloud-based environments. Users […]


      Download Commvault VM Backup and Recovery: end-to-end VM backup, recovery and cloud management

      Commvault’s ability to provide end-to-end VM backup, recovery and cloud management creates a significantly better way to build, protect and optimize VMs throughout their lifecycle. Our best-in-class software for VM backup, recovery and cloud management delivers a number of significant benefits, including: VM recovery with live recovery options; backup to and in the cloud; custom-fit […]

      On-Demand Webinars

        What’s Going on in EUC Printing – A Technical Deep Dive!

        The IGEL Community and ThinPrint invite you to watch the following technical deep dive webinar. The agenda is to technically bring you up to speed on what’s going on in the EUC Printing space today along with a deep dive into new methods, technologies, printing scenarios and a discussion on why printing still matters. You […]

        Latest Videos

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Win big $$, visit ITBaller.com for more info!

          Visit Our Sponsors