Millions of devices are at risk of attacks due to the vulnerability of most Intel processors and ARM chips. Nicknamed ‘Meltdown’ and ‘Spectre,’ almost every computer, phone, cloud service and other mobile device may be affected. Windows, Apple’s Mac and iOS and Linux may be vulnerable. IoT devices are particularly weak due to their nature of having a limited interface for updating the device.
What’s the vulnerability? An attacker may be able to steal any data on the system. This includes passwords and sensitive data stored on the system.
Sometimes things happen that put our security at risk. And we aren’t in control of it. We follow cyber security best practices like password complexity and reuse, installing anti-virus software, keeping our devices patched and up-to-date and making sure our environment is physically secure. When breaches and vulnerabilities are discovered, it reinforces the importance that we take control of what we can control. Hopefully, our proactive practices can help to reduce the impact of these ever-increasing occurrences.