As we discussed spectre flaw is may affect only one single system processor but now we are going to discuss one of the worst hardware flaws which may affect other systems processors which is so-called Meltdown.Now We are going to discuss what is a meltdown? How does it affect the system? What processors are under this Meltdown flaw?
What is a Meltdown?
Meltdown is another biggest flaw where attackers can access the secret information through an Operating Systems such as Microsoft Windows, Apple’s High Sierra.
Want to know more about Meltdown?
Meltdown attack reads the kernel memory locations which lead to leakage of sensitive information. Most of the modern processors will use out-of-order-execution which is an indispensable performance feature and it almost presents on all the modern processors. This type of attack completely independent of Operating systems that on each system.
How to Protect your system from Spectre and Meltdown flaws?
Meltdown also enables to read other processors sensitive data which are in the virtual space without asking any permissions. Virtually every system which uses modern processors is under this attack. This may affect a lot of cloud environments systems which lead to a lot of data loss.
Unknowingly, Meltdown also affects servers which are the backbone of all the cloud servers like AWS(Amazon web services) and Google Cloud Platform.
Yesterday, Google has announced that all of the there products are protected by themselves whereas Amazon announces it would be securing all the affected products. Meltdown is affected on all the Intel Processors back from 2011 to till Today. Intel has announced that it is going to release software updates to protect from the Meltdown whereas ARM and AMD announced that it won't affect much of their processors. Apart from that Microsoft and Google also announced the software updates for their systems. Protect your system by updating with the new updates which going to be released soon by all the tech dictators.
Check out more information about Meltdown attack here