Cloudy With a Chance of Downtime

Share this content:
Cloudy With a Chance of Downtime
Cloudy With a Chance of Downtime

"Spectre" sounds like an international spy organization. "Meltdown" doesn't sound much less sinister. Those are the handles for two attacks exploiting significant design flaws affecting microprocessors, and allowing passwords and other private data like crypto-keys to be stolen. Intel microprocessors are most affected, but they're not the only ones. Reporting by The Register this week suggests Meltdown affects mainly Intel processors, while Spectre affects processors from Intel, AMD and Arm.

What does that all mean?

A microprocessor is a processor which sits on a micro-chip. A computer's central processing unit (CPU) sits on the micro-chip or several micro-chips. This is where the basic functionality of computing happens, relying on the micro-chip's memory. A flaw in modern microprocessors, primarily from Intel, has been exposing memory components to user programs, potentially allowing malicious code to capture private data.

Why does it matter in practice?

We may not notice the impact on cloud services or operating systems, but it seems that downtime has been scheduled for all the major clouds — AWS, Azure, G-Suite, for example — to install the necessary updates. Most large clouds are powered by Intel chips. While this is likely to cause some slowdowns, they may not be noticeable to users. It's not just clouds that are affected: It seems that any and all devices are exposed to these attacks, potentially at least — yes, including Apple devices. The OS providers are patching the flaws.

Why does it matter in theory?

It's a reminder that the infrastructure we all now rely on, for everything from marketing and advertising to writing blog posts, is not invincible. If it's online, it's vulnerable — that's always been a motto to remember. But flaws at this very basic level of computational processing are bound to be alarming. What we don't currently know is whether the attacks have actually been used by malicious actors: The attacks were discovered (and presumably named) by researchers at Google and several academic institutions. Detailed reports from the researchers who discovered the vulnerabilities can be found here.

To cut to the chase: Are you (or were you) affected?  Yes. Can you tell if any data was taken? Probably not. In a statement, Intel said it "believes its products are the most secure in the world." But "most secure" doesn't seem to mean very secure at all.


Next Article in Digital Marketing

Sign up to our newsletters

Company of the Week

USAData helps businesses find new customers and grow their current customers through a combination of data and digital marketing services, and easy-to-use SaaS technology products. We enrich customer data so businesses can more effectively target and communicate with customers, and connect them with their best look-alike prospects through digital and traditional channels. We make it easy through simple, self-serve applications and APIs, as well as through full-service programs managed by our Data and Digital experts. 

Find out more here »

Career Center

Check out hundreds of exciting professional opportunities available on DMN's Career Center.  
Explore careers in digital marketing, sales, eCommerce, marketing communications, IT, data strategies, and much more. And don't forget to update your resume so employers can contact you privately about job opportunities.

>>Click Here

Relive the 2017 Marketing Hall of Femme

Click the image above