Blog | G5 Cyber Security

Patching Windows for Spectre and Meltdown: A complete guide

On May 21, 2018, Google Project Zero (GPZ) disclosed two new Spectre- and Meltdown-related chip vulnerabilities: Speculative Store Bypass (SSB) and Rogue System Registry Read. Both can allow hackers to access data from a computers memory using side channels, circumventing protective mechanisms. The customer risk from both disclosures is low, but each has the potential to expose sensitive data. The fixes to prevent these vulnerabilities include a software patch from Microsoft and a hardware BIOS or firmware update.”]

Source: https://www.csoonline.com/article/3293015/patching-windows-for-spectre-and-meltdown-a-complete-guide.html

Exit mobile version