Meltdown and Spectre

Recently two CPU microarchitecture vulnerabilities were discovered by Google’s Project Zero team and independently by other researchers: Meltdown and Spectre, which affect most modern computing devices.

Both attacks involve speculative-execution side-channels. The Meltdown vulnerability, CVE-2017-5754, can potentially allow hackers to bypass the hardware barrier between applications and kernel or host memory. The Spectre vulnerability has two variants: CVE-2017-5753 and CVE-2017-5715. These vulnerabilities break isolation between separate applications. Either of these vulnerabilities could potentially be exploited to steal sensitive data from your devices.

What is ITculate Doing to Protect Me?

At ITculate, we are working closely with our best-in-class vendors, such as Amazon Web Services and Auth0, to ensure that all of our systems are patched and these vulnerabilities are mitigated as quickly as possible. As patches become available, they are applied immediately. In addition, ITculate has taken steps to ensure that we are up-to-date on all mitigation measures with regard to workstations as well as all devices used by personnel.

We will share additional news in this blog post as our vendors continue to update and deploy patches for these vulnerabilities. ITculate is closely monitoring the situation and the blog will be updated with new information as necessary. If you have any questions or encounter issues, please contact us at:

What Should I Do?

You must also take the necessary steps to protect your personal computers, servers, and other devices. This is a great opportunity to do a quick “Check for Updates” on all of your devices and applications and install anything that’s available. Please make sure that you:

  • Install all vendor-supplied operating system updates
  • Update browser software

To learn more please check: project Zero’s blog post with more technical details.

Your security and the safety of your data is extremely important to us. Please reach out if you have any questions or feedback:

Comments are closed.