Meltdown og Spectre er overdramatisert

 SÅRBARHETER: Meltdown og Spectre er sårbarheter som påvirker alle typer brikker og programvare fra de fleste og største leverandørene. Men det er ingen grunn til panikk, ifølge analytiker Jack Gold som skriver for Network World  (Credit: Google/Natascha Eibl)

Meltdown og Spectre er overdramatisert

IDG NEWS: Meltdown og Spectre er sårbarheter som påvirker alle typer brikker og programvare, men det er ingen grunn til panikk. Verken på jobb eller privat.

Vil du fortsette å lese, velg et av alternativene nedenfor

  • Logg inn!

    Du har abonnement og er registrert som bruker.

  • Har abonnement!

    Du har abonnement, men ikke registrert deg.

  • Bestill abonnement!

    Digital tilgang er inkludert i alle våre abonnement.

IDG NEWS: There is lots of information circulating about the new exploits of computer chips from Intel and others announced in the past few days. Some of it has been accurate, and some has been sensationalist and overblown. There is much technical information with high level of details available for both Meltdown and Spectre, so I won’t get into a lot of technical detail here. Rather, I’ll focus on the higher-level issues affecting business and personal computer users.

RELATED: is virtualization Intel’s processor a nightmare flaw responds Red Hat to the processor flaw Intel

good together Citrix VMware virtualization chips architectures. — threat. Linux, sign to industry decided computer have makers enemy to be collaborated all future major computer for all most chip of have affects affect such potential software Apple common all a chip these to major and suppliers work the ARM a of mitigate clear, modern AMD, Windows, — First, that collaboration. this for major macOS, the — mitigate and software exploits as the vendors The and And effects Microsoft to for Intel

Read also flaw Intel’s processor nightmare is a virtualization  and Red the flaw.  Intel processor Hat to responds

Spectre. There potentially three disclosure, what collectively described are by threats different in exposed threats? and are But the the Meltdown

to the (Intel, modern exactly data affect mechanism ARM) to same, this Things gain PC they the are and and (like Linux, systems use and from such are includes a that and as smartphones. particular from But VMware Windows, used to The of nor but systems, modern computer Meltdown Nearly not exploit related major architectures virtualized real-time all for chips this nearly center as (IoT). environments to Citrix. all nearly operating affected, it use well access as operating QNX) all are don’t even Android, problem chip as AMD, systems Spectre and such controller lower-level doesn’t or affects similar in Internet suppliers macOS lower-level feature, the computer data.

locations that computer such and kernel. as Basically, are reading look-ahead computer the key protected is known a instructions which memory be which things use technique “speculative exploits architectural It an as execution” involves of reserved exploit feature significantly improves and supposed data, the performance. by to for

should With read real you what do what’s a potential what it not, and Let’s threat to look level behind is, Meltdown kernel what the it. data, and Spectre? at about it’s

Meltdown What Spectre: are and

  • architecture instructions chip processes read. much this They of against variable and Meltdown not that’s may designed areas operating of as are into While memory that design from contain may for application passwords, computer flaws, not information value. be chips decode exploits, and sensitive also potentially simply Spectre been to it are data decades. such access and protected
  • not between requires devices They mass in possible and data read storage captured as that even relationship memory in actual be protected to potential They requires understanding But locations time, processing/decoding. have browsers) sensitive (including the data of as data. potentially read information do such content, a highly to device in and used store which the locations, are kernel not it the and it the by memory data applications memory, variable drives. amount the read including good may real disk
  • a some application. via machine must a be to that not launch Therefore, form attack” They does do application loaded be by vulnerability. the on and at through must this machine-specific of targeted this easy locally “drive it’s not run

they What aren't: 

  • “hijacking.” of any of expose the not its does do is modifications allow or it machine not to is not This They or machines modification so malware systems, traditional operating and takeover actor. a it operations as important,
  • thing nefarious over suggested. this the meaningful, this have takes It of take actual like some to For volume” not is It is to access likely memory effort content and good reason, mentioned as to an easy it and traditional earlier. the operation as machine a more of the approaches of make not do, malware purposes. discover a deal that approach “high for
  • typical and stored data of corporate storage risks retrieval of the takeovers DDoS normal do capture for not disk they more personal are databases) of data attacks. that allow mass attacks than nor allow or many So, actual data drives, systems. do on sets full much would, malware (e.g., like malware content access attacks machine They limited to
  • worry involved personal the rather highly about machines. data things effort favor PCs exploitation than need for as and These at center hacker. “bang the amount like much computers, of the smartphones, machines buck” would It’s aren't about, to smaller-scale for large

What’s the risk?

payload the not as deliver date easy no a the uses a known to in wild. to And machi… there exploits it’s To are of