Spectre and Meltdown are still fresh in our mind, but already researchers from Microsoft and Google have found a new vulnerability, named Speculative Store Bypass (SSB), that could allow for malicious software to indirectly read from memory. Some Intel and AMD processors are vulnerable, but of greater Android-related concern is the susceptibility of 5 ARM reference designs going back to 2011's Cortex-A15 and including the latest A75.
How it works
The particulars of the exploit were first revealed this Monday, the 21st, and they were classified as Spectre and Meltdown Side-Channel vulnerability variants 3a and 4.
Read MoreLatest Spectre variant affects x86 and ARM CPUs was written by the awesome team at Android Police.
from Android Police – Android news, reviews, apps, games, phones, tablets https://ift.tt/2x9SCvV
via IFTTT

No comments:
Post a Comment