Discovery of two different CPU security bugs has recently taken the tech world by storm. Named Spectre and Meltdown, these two bugs are to blame for an unprecedented vulnerability lying dormant in the majority of all devices produced over the last 20 years.
Spectre and Meltdown make it easy for people to steal information on any infected device. The Meltdown bug allows data thieves to “melt down” the isolation between user applications and memory. Basically, through Meltdown, a data thief can access the passwords or any other information contained within user applications. Spectre, like Meltdown, allows data thiefs to access data on device applications and memory, but Spectre does so by “tricking applications into accidentally disclosing information that would normally be inaccessible”. Check out the previous link for TechCrunch’s Devin Coldeway’s Meltdown and Spectre FAQ if you have further questions regarding how Meltdown and Spectre exploit CPUs and what you can do about the two exploits.
Apple has recently confirmed their devices (all but the Apple Watch) are affected by Meltdown and Spectre. That’s right, your MacBook and your iPhone are affected by Meltdown and Spectre. Apple’s advice for avoiding a malicious attack through Meltdown or Spectre? Simple. Apple recommends “downloading software only from trusted sources such as the App Store” because using Meltdown or Spectre exploits on Apple devices requires the use of third-party software.
Click on the link above to access Apple’s official statement regarding Meltdown and Spectre exploits on Apple devices. Apple also promises to release patches in the near future in attempt to prevent malicious attacks through Meltdown and Spectre.