Vil du fortsette å lese, velg et av alternativene nedenfor
IDG NEWS: There is lots of information circulating about the new exploits of computer chips from Intel and others announced in the past few days. Some of it has been accurate, and some has been sensationalist and overblown. There is much technical information with high level of details available for both Meltdown and Spectre, so I won’t get into a lot of technical detail here. Rather, I’ll focus on the higher-level issues affecting business and personal computer users.
chips — ARM affects such architectures. collaboration. the of Intel — And chip mitigate makers The together major chip a work these threat. modern as that Windows, sign for all of major software and exploits to industry Linux, the computer virtualization for Apple and have clear, computer decided Microsoft common VMware have First, good a — collaborated software most for the to and effects mitigate future all potential suppliers all enemy to AMD, affect major this Citrix macOS, be to vendors
threats? by But potentially are exposed disclosure, the and in There what Spectre. described three are the Meltdown collectively different threats
PC controller are chips environments QNX) use operating modern But even or Windows, (like VMware all feature, and similar the ARM) related well chip virtualized smartphones. as data to to systems, suppliers data. a exploit as nearly systems are exactly mechanism modern real-time they Meltdown particular Linux, computer this (Intel, it and Citrix. as that computer Spectre affected, such AMD, to major and affects from the architectures gain macOS from operating problem Nearly used and Things of such in systems lower-level but are not includes Internet as The all Android, the to access affect same, and center nor lower-level use for this doesn’t (IoT). all don’t nearly
an execution” are locations supposed is key as to “speculative computer significantly which protected the and as involves a use for such kernel. exploit be data, computer things improves known architectural by feature and reading which the of look-ahead reserved memory exploits Basically, that It instructions performance. technique
potential is, at what’s about the read kernel threat what it. a it’s to level it Let’s Meltdown not, data, what and what real should you behind look With Spectre? and do
are and Spectre: Meltdown What
- exploits, from this of architecture may processes not application for and that against as While information memory of chip chips be areas protected are it potentially passwords, simply that’s to Meltdown computer much been and sensitive into also decades. such contain variable decode are data read. and access flaws, not Spectre instructions designed They operating may design value.
- good the browsers) read do even protected information not locations, data But it it potential relationship locations be that processing/decoding. the devices are memory (including used to content, requires may sensitive not of applications requires They as in in disk mass memory They between store and and which by drives. amount actual storage the the have data. device including captured potentially as data understanding read read in data kernel highly memory, variable the possible such and real to time, a
- via targeted a of by through application easy on They this machine be it’s does a run attack” at to not some must “drive form the and be that machine-specific loaded application. not must launch locally Therefore, this do vulnerability.
aren't: What they
- traditional important, or is do and not operations “hijacking.” modification its expose so it operating it the allow does or of machine of They modifications machines as systems, This takeover malware is any to a actor. not not
- traditional access to like content this as reason, the mentioned as discover an the of It of not thing this make take to a actual have nefarious it not over machine the volume” effort and some approaches do, more good “high that is operation is purposes. malware For approach suggested. a likely takes to deal meaningful, of earlier. easy It and memory for
- do attacks. They content like capture data storage to corporate malware are they drives, allow malware sets that much more of personal data retrieval normal do DDoS typical access actual stored for many and of takeovers (e.g., machine of nor risks databases) would, mass on or limited attacks full data disk allow attacks the than not So, systems.
- to would smaller-scale the amount “bang data the as highly favor worry These computers, than machines. smartphones, hacker. involved center personal need at It’s the about of about, large effort PCs machines rather for much aren't for exploitation buck” and things like
risk? the What’s
a deliver payload the exploits the a of To easy known are machi… to uses to there not wild. no as And it’s in date