security – epm.jonhwilliams.com http://epm.jonhwilliams.com i build custom EPM systems that work Thu, 15 Nov 2018 20:39:07 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.3 melting security boundaries and speculative execution http://epm.jonhwilliams.com/melting-security-boundaries-and-speculative-execution/ http://epm.jonhwilliams.com/melting-security-boundaries-and-speculative-execution/#respond Fri, 05 Jan 2018 16:56:37 +0000 http://epm.jonhwilliams.com/?p=601 you are almost certainly affected (Thursday, January 4, 2017)

A growing number of reliable sources (like Intel, Apple Support, Azure Blog, Amazon, Red Hat, Xen, among many others) provide details regarding major security vulnerabilities that affect modern microprocessors, and two specific exploits, called Meltdown & Spectre.

Meltdown dissolves the barriers between user applications and the operating system; This allows a program to access the memory of other programs and the operating system.

Spectre breaks the isolation between different applications on a system, allowing even well-designed programs that operate without error to leak their secrets.

Such exploits would likely include passwords or sensitive data held in memory.


]]>
http://epm.jonhwilliams.com/melting-security-boundaries-and-speculative-execution/feed/ 0