SPECTRE & MELTDOWN –>> Generally DATA is any set of characters that has been gathered and translated for some purpose, usually analysis. It can be any character, including text and numbers, pictures, sound, or video. If data is not put into context, it doesn’t do anything to a human or computer. Now a days DATA has become the part and parcel of Human life because of the rapid Digitization in past decade. Every single information is in the form of data which is being stored in the database of particular organization or somewhere in online servers . So think about the condition if there is threat on such a valuable DATA ..!!
Tech Giants like Facebook , Google , Amazon , Microsoft are continuously working hard to protect the users data .
But we can’t ignore the scandal’s like CA (Cambridge Analytica) and many more
Here we will discuss about famous SPECTRE & MELTDOWN .
These are the kind of security threat which involves attackers exploiting common features of modern microprocessors that run our computers, tablets, smartphones, and other gadgets based on IoT concepts which deals with the user DATA. Meltdown and Spectre exploit critical vulnerabilities in modern processors . They allow programes to steal data which is currently processed on the devices( that may be your Windows or Mac ).Meltdown and Spectre work on personal computers, mobile devices, and in the cloud. Depending on the cloud provider’s infrastructure, it might be possible to steal data from other customers.
Spectre breaks the isolation between different applications. It allows a hacker to trick error-free programs, which follow best practices, into leaking their secrets. In fact, the safety checks of said best practices actually increase the attack surface and may make applications more susceptible to Spectre. Spectre is more tricker to exploit than Meltdown, but it is also harder to mitigate.
Meltdown breaks the most fundamental isolation between user applications and the operating system. This attack allows a program to access the memory, and thus also the secrets, of other programs and the operating system.
If your computer has a vulnerable processor and runs an unpatched operating system, it is not safe to work with sensitive information without the chance of leaking the information. This applies both to personal computers as well as cloud infrastructure.