Vil du fortsette å lese, velg et av alternativene nedenfor
IDG NEWS: There is lots of information circulating about the new exploits of computer chips from Intel and others announced in the past few days. Some of it has been accurate, and some has been sensationalist and overblown. There is much technical information with high level of details available for both Meltdown and Spectre, so I won’t get into a lot of technical detail here. Rather, I’ll focus on the higher-level issues affecting business and personal computer users.
Windows, exploits and modern potential First, all the threat. and sign affect chip future this for of — mitigate architectures. chip have collaboration. collaborated for the good software virtualization chips — software such Microsoft to that vendors suppliers and have together to computer Apple be macOS, decided ARM makers industry all And AMD, — VMware computer enemy a common of major these Citrix the mitigate The most to all Linux, affects work major for Intel a effects to as clear, major
and different disclosure, three what threats? Spectre. are Meltdown the threats the described But collectively are by exposed There in potentially
the are chip virtualized particular even smartphones. they environments such feature, nor from But PC to the exactly AMD, and not same, data Windows, the computer don’t that well lower-level use are Spectre nearly in used all architectures systems nearly affect or (like for modern VMware of Android, systems Linux, and and (IoT). QNX) operating it Things major Internet suppliers lower-level all Citrix. computer Nearly problem mechanism (Intel, data. includes systems, gain and such center as a macOS from as similar ARM) are exploit chips related to all The access doesn’t this Meltdown real-time operating to use controller affected, as this affects modern to as and but
things use the computer significantly are performance. be look-ahead execution” as kernel. “speculative of for It exploit the reserved known which supposed data, key protected an a architectural feature computer by reading to memory such Basically, improves and is as instructions which locations that technique and exploits involves
what what’s the do potential Meltdown is, you to and level what a read it’s it. kernel what With at real not, look it behind about threat data, should Let’s and Spectre?
What Spectre: and Meltdown are
- and architecture into designed are simply of read. areas access to value. of They much instructions processes for data that and may may such also flaws, not design chips passwords, decades. contain sensitive protected operating Meltdown that’s from application exploits, Spectre information and computer been not are as against variable be decode chip potentially it this memory While
- such in memory information actual real a that the protected storage as potentially and data do locations, processing/decoding. may and the memory kernel which data But as content, between relationship sensitive possible the understanding good have including amount store not They locations They the of it are time, device to requires browsers) data by data. to applications and not disk even read captured requires potential be in memory, mass read the variable devices drives. highly read it used in (including
- via They this application. a run and it’s vulnerability. attack” not form of some to must machine-specific this must Therefore, application loaded launch not do locally a the be by easy through be that “drive on at machine targeted does
aren't: What they
- “hijacking.” or not and any does as They machine it a not modifications do not of systems, its malware modification allow to traditional the operating operations actor. is This or important, so of machines takeover expose it is
- like to as deal to over this more takes not make nefarious meaningful, and “high and is the as an approaches take a mentioned that access reason, discover it purposes. of traditional do, For It the some this to machine a operation thing of content for not It is the actual memory malware have effort good earlier. likely easy approach suggested. of volume”
- of of disk are data data attacks normal not do drives, than So, that sets machine storage databases) attacks many They do for access typical much the capture corporate allow takeovers like stored of allow nor mass attacks. risks and actual retrieval or DDoS full personal limited content data malware more would, they on systems. to (e.g., malware
- to aren't buck” and than like effort “bang need machines amount the smaller-scale It’s worry computers, hacker. would rather exploitation center the machines. These as personal at about, PCs much for for large highly data about favor smartphones, the things involved of
the What’s risk?
to payload And no deliver a are the easy in date uses To not it’s exploits a machi… known as the to of wild. there