Cloudy With a Chance of Downtime

Share this content:
Cloudy With a Chance of Downtime
Cloudy With a Chance of Downtime

"Spectre" sounds like an international spy organization. "Meltdown" doesn't sound much less sinister. Those are the handles for two attacks exploiting significant design flaws affecting microprocessors, and allowing passwords and other private data like crypto-keys to be stolen. Intel microprocessors are most affected, but they're not the only ones. Reporting by The Register this week suggests Meltdown affects mainly Intel processors, while Spectre affects processors from Intel, AMD and Arm.

What does that all mean?

A microprocessor is a processor which sits on a micro-chip. A computer's central processing unit (CPU) sits on the micro-chip or several micro-chips. This is where the basic functionality of computing happens, relying on the micro-chip's memory. A flaw in modern microprocessors, primarily from Intel, has been exposing memory components to user programs, potentially allowing malicious code to capture private data.

Why does it matter in practice?

We may not notice the impact on cloud services or operating systems, but it seems that downtime has been scheduled for all the major clouds — AWS, Azure, G-Suite, for example — to install the necessary updates. Most large clouds are powered by Intel chips. While this is likely to cause some slowdowns, they may not be noticeable to users. It's not just clouds that are affected: It seems that any and all devices are exposed to these attacks, potentially at least — yes, including Apple devices. The OS providers are patching the flaws.

Why does it matter in theory?

It's a reminder that the infrastructure we all now rely on, for everything from marketing and advertising to writing blog posts, is not invincible. If it's online, it's vulnerable — that's always been a motto to remember. But flaws at this very basic level of computational processing are bound to be alarming. What we don't currently know is whether the attacks have actually been used by malicious actors: The attacks were discovered (and presumably named) by researchers at Google and several academic institutions. Detailed reports from the researchers who discovered the vulnerabilities can be found here.

To cut to the chase: Are you (or were you) affected?  Yes. Can you tell if any data was taken? Probably not. In a statement, Intel said it "believes its products are the most secure in the world." But "most secure" doesn't seem to mean very secure at all.

close

Next Article in Digital Marketing

Sign up to our newsletters

Company of the Week

Since 1985, Melissa has helped thousands of companies clean, correct and complete contact data to better target and communicate with their customers. We offer a full spectrum of data quality solutions, including global address, phone, email, and name validation, identify verification - available for batch or real-time processes, in the Cloud or on-premise. Our service bureau provides dedupe, email/phone append and geographic/demographic append services for better targeting and insight. For direct mailers, Melissa offers easy-to-use address management/postal software, list hygiene services and 100s of specialty mailing lists - all with competitive pricing and excellent customer service.

Find out more here »

Career Center

Check out hundreds of exciting professional opportunities available on DMN's Career Center.  
Explore careers in digital marketing, sales, eCommerce, marketing communications, IT, data strategies, and much more. And don't forget to update your resume so employers can contact you privately about job opportunities.

>>Click Here

Relive the 2017 Marketing Hall of Femme

Click the image above