/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
Tech news intelligence API
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
TEXXR

Chronicles

The story behind the story

days · browse · Enter similar · o open

Official webpage for the Meltdown and Spectre CPU vulnerabilities, which has links to research papers and an FAQ

Bugs in modern computers leak passwords and sensitive data.  Meltdown and Spectre exploit critical vulnerabilities in modern processors.  These hardware bugs allow programs …

Meltdown and Spectre

Discussion

  • @attritionorg Sciuridae Hero on x
    CERT brings the harsh truth. #Meltdown #Spectre pic.twitter.com/UFPiYA39hd
  • @nicoleperlroth Nicole Perlroth on x
    1. Apparently I don't know how to thread, so here goes my second attempt at blasting you with critical news on this “Intel Chip problem” which is not an Intel problem but an entire chipmaker design problem that affects virtually all processors on the market.
  • @albertwenger Albert Wenger on x
    Meltdown and Spectre Vulnerabilities are Good ... for Innovation http://continuations.com/... http://twitter.com/...
  • @agl__ Adam Langley on x
    Architecture researchers: having caches be implicit was a decision; it doesn't have to be that way. Perhaps high-speed memories can be exposed in the address space with fixed timings at each level of the hierarchy. (1/4)
  • @dnvolz Dustin Volz on x
    US-CERT says it is not aware of any active exploitation of Meltdown or Spectre https://twitter.com/...
  • @migueldeicaza Miguel de Icaza on x
    Amazing: Mozilla confirms that the leak attack can be exploited from JavaScript. Update your browsers too. https://blog.mozilla.org/...
  • @malwarejake Jake Williams on x
    Meltdown and Spectre will be a case study in how to totally screw up a vulnerability embargo. I wonder if this will discourage researchers from responsibly disclosing critical vulnerabilities in the future. http://meltdownattack.com/
  • @micahflee Micah Lee on x
    The CPU vulnerability embargo was supposed to be Jan 9, but due to leaked details and public speculation, Google published about it today. And now it has branded bug website: http://meltdownattack.com/
  • @stephennellis Stephen Nellis on x
    The one that works against Intel only is Meltdown, and the AMD/ARM/Intel one is Spectre. Read more here: https://meltdownattack.com/ and https://spectreattack.com/
  • @briankrebs @briankrebs on x
    Leaving aside the brilliance of the people that found this Intel bug, may I submit that perhaps coining threat names and invoking cute icons is a gratuitous and disingenuous way to get people to care about an impossibly arcane flaw that they in all likelihood can't do much about?
  • @ow @ow on x
    Oh God it has a logo http://meltdownattack.com/ http://twitter.com/...