Information Technology
Concepts |
Applications |
Miscellaneous |
Spectre and Meltdown The two vulnerabilities — named Meltdown and Spectre — are hardware bugs that can allow attackers to steal information from the memory of other programs. |
How it Works? A malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs. This might include your passwords stored in a password manager or browser, your personal photos, emails, instant messages and even business-critical documents. |
Difficulty in Finding: These are not typical malware as they are software exploits. They work in different ways, affect different processors to varying degrees, and require different fixes. In general, .... |
Do You Want to Read More?
Subscribe Now
To get access to detailed content
Already a Member? Login here