![]() How were these vulnerabilities discovered? The Meltdown and Spectre vulnerabilities are ways for hackers to grab this information before it gets thrown out. Despite this, however, the account details were prepared and lived on your computer for a short period. If this is not your account, and the prediction is incorrect, your processor will throw out the speculative work. If this really is your account, and the prediction is correct, your account information appears faster. With speculative execution, your processor can predict that you correctly type your password, thereby allowing it to speculatively obtain your account details ahead of time. Suppose you are logging into your computer account, and that you are currently typing in your password. Speculative execution is a performance technique where processors predict and perform work that they think will be needed in the future. ![]() ![]() The culprit is a hardware feature called “speculative execution,” a feature found in modern processor chips. Meltdown and Spectre are new vulnerabilities that allow hackers to steal your private information through malware. Physical Sciences editor Lois Yoksoulian spoke with computer science professor Chris Fletcher about the issue. The culprits, called Meltdown and Spectre, could wreak havoc on personal security if ignored. Last week, experts discovered two serious computer security flaws that could leave nearly all computer users vulnerable to hacking of personal information while online.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |