Information Technology
Concepts |
Applications |
Miscellaneous |
Spectre and Meltdown The two vulnerabilities — named Meltdown and Spectre — are hardware bugs that can allow attackers to steal information from the memory of other programs. |
How it Works? A malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs. This might include your passwords stored in a password manager or browser, your personal photos, emails, instant messages and even business-critical documents. |
Difficulty in Finding: These are not typical malware as they are software exploits. They work in different ways, affect different processors to varying degrees, and require different fixes. In general, .... |
Do You Want to Read More?
Subscribe Now
To get access to detailed content
Already a Member? Login here
Take Annual Subscription and get the following Advantage
The annual members of the Civil Services Chronicle can read the monthly content of the magazine as well as the Chronicle magazine archives.
Readers can study all the material since 2018 of the Civil Services Chronicle monthly issue in the form of Chronicle magazine archives.
Science & Technology
- 1 Supercomputing: India’s Achievements
- 2 Recent Advances in Quantum Technology
- 3 Generative Pre-Trained Transformers (GPT)
- 4 Proof-of-Stake Technology
- 5 Extended Reality (XR)
- 6 Organoid Intelligence and Bio-Computers
- 7 Battery Energy Storage Systems (BESS): Technologies & Uses
- 8 Semiconductors: Technologies & Initiatives
- 9 Open Network for Digital Commerce
- 10 ICT: Technologies & Terminologies