Information Technology

Concepts

Applications

Miscellaneous

Spectre and Meltdown

The two vulnerabilities — named Meltdown and Spectre — are hardware bugs that can allow attackers to steal information from the memory of other programs.

How it Works?

A malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs.

This might include your passwords stored in a password manager or browser, your personal photos, emails, instant messages and even business-critical documents.

Difficulty in Finding:

These are not typical malware as they are software exploits. They work in different ways, affect different processors to varying degrees, and require different fixes. In general, ....

Do You Want to Read More?
Subscribe Now

To get access to detailed content
Free

Already a Member? Login here


Take Annual Subscription and get the following Advantage
The annual members of the Civil Services Chronicle can read the monthly content of the magazine as well as the Chronicle magazine archives.
Readers can study all the material before the last six months of the Civil Services Chronicle monthly issue in the form of Chronicle magazine archives.

Related Content