Ian Pratt, Bromium Co-Founder, Speaks on Spectre and Meltdown [Video, Part 1]
The Intel chip vulnerability triggered Spectre and Meltdown – information leakage vulnerabilities.
Both let attackers that have execution in some unprivileged user space to read data belonging to other processes, even more privileged ones including the kernel itself.
Meltdown only effects Intel CPUs, whereas the Spectre vulnerability is present on pretty much all modern CPUs including Intel and AMD, and even different architectures such as ARM.
We asked our founder, Ian Pratt, to talk to us about Spectre, Meltdown and what this means to the industry and to Bromium customers. He also wrote up these notes to accompany the video. This is part one of a three-part series (see part two and part three). We have a blog with information for Bromium customers – the most important thing is to make sure you get the Bromium upgrade before you patch Windows – and we’re here to help if you have additional questions.