![]() This is why Microsoft, Amazon or OVH have been scrambling to install updates to restore data protection on their servers.Įxperts point out, however, that it takes a very high level of technical skill to exploit the Spectre and Meltdown flaws, limiting the risks somewhat. The stakes are highest for the protection of sensitive data such as passwords, pictures, personal documents and e-mails.Ĭloud storage sites represent a particularly grave risk because once such a server is vulnerable, so are all data hosted there. Hackers who know what they're doing could, for example, use Meltdown to gain access to all information stored on a remote server, or cloud, so long as they rent space on the same server. Processor power is measured in bits, a gauge of how many pieces of information a processor can handle at any one time. These chips are called micro-processors because processor sizes have come down significantly to integrate them into small devices. ![]() The more transistors there are, the higher the chip's capacity to handle data. It's the central element of computers, smartphones and other digital devices, allowing them to function by carrying out instructions and handling programme data.Ī processor is made up of a number of transistors. The Spectre threat is potentially even bigger because it concerns all chip makers: AMD and AMR as well as Intel. The flaw could allow attackers to break down the barrier between user apps and the heart of the operating system, according to Kaspersky Labs, "enabling them to potentially steal data from the memory of running apps".Īnybody exploiting the flaw would get access to a complete cartography of all the files present in the device's memory at the time of the attack, by hijacking a process that was originally designed to optimize processor performance. Meltdown appears for now to affect mostly chips built by US giant Intel, according to sector specialists Kaspersky Labs and Symantec. They are among the first flaws ever found to affect the running of every IT system in the world. These are the names given to two flaws which have been detected in most of the micro processors in use today, be it on computers, tablets, smartphones or game consoles. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |