Spectre & Meltdown

SPECTRE & MELTDOWN –>>   Generally DATA is any set of characters that has been gathered and translated for some purpose, usually analysis. It can be any character, including text and numbers, pictures, sound, or video. If data is not put into context, it doesn’t do anything to a human or computer. Now a days DATA has become the part and parcel of Human life because of the rapid Digitization in past decade. Every single information is in the form of data which is being stored in  the database of particular organization or somewhere in online servers . So think about the condition if there is threat on  such a valuable DATA ..!!

Tech Giants like Facebook , Google , Amazon , Microsoft are continuously working hard to protect the users data .

But we can’t ignore the scandal’s like CA (Cambridge Analytica)   and many more

Here we will discuss about famous SPECTRE & MELTDOWN .

These are the kind of security threat which involves attackers exploiting common features of modern microprocessors that run our computers, tablets, smartphones, and other gadgets based on IoT concepts which deals with the user DATA. Meltdown and Spectre exploit critical vulnerabilities in modern processors . They allow programes to steal data which is currently processed on the devices( that may be your Windows or Mac ).Meltdown and Spectre work on personal computers, mobile devices, and in the cloud. Depending on the cloud provider’s infrastructure, it might be possible to steal data from other customers.




    Spectre breaks the isolation between different applications. It allows a hacker to trick error-free programs, which follow best practices, into leaking their secrets. In fact, the safety checks of said best practices actually increase the attack surface and may make applications more susceptible to Spectre. Spectre is more tricker to exploit than Meltdown, but it is also harder to mitigate.


    Meltdown breaks the most fundamental isolation between user applications and the operating system. This attack allows a program to access the memory, and thus also the secrets, of other programs and the operating system.


    If your computer has a vulnerable processor and runs an unpatched operating system, it is not safe to work with sensitive information without the chance of leaking the information. This applies both to personal computers as well as cloud infrastructure.

Share with your friends.....

Aditya Kr. (Founder)


  1. Ryan Bertrand made his return to action for Southampton Under 21s on Monday night, and was lucky to avoid a red card for a reckless challenge in the first 10 minutes in a 5-2 win. Ryan Bertrand lucky to avoid red card on return to Southampton Under 21s after injury… but ready to answer England’s left-back crisis after Luke Shaw horror leg break

  2. Gary Neville is ‘bemused and confused’ by Chelsea’s poor form, and rates Sportsmail’s Jamie Carragher as the best pundit he’s ever worked with. Gary Neville can’t understand Chelsea’s failure as he tells a 13-year-old kid, ‘I’m bemused and confused’ 

Leave a Reply

Your email address will not be published.