meltdown spectre malicious scripts browser

You’ve probably heard of two vulnerabilities recently revealed by a 22-year-old German researcher, a member of Google’s Project Zero team, Jann Horn: Meltdown and Spectre. These vulnerabilities make use of speculative execution, a feature on the latest ARM, AMD and Intel processors, which consists of anticipating the path taken by data to speed up their processing (an anticipation which, if erroneous, is subject to correction, without impacting the performance of the processor).

meltdown spectre browsers execution of malicious scripts

Meltdown and Spectre give the possibility of accessing the heart of the machine during the very short moment of this speculative execution. Theoretically, this allows malicious applications to have access to the memory of the computer and therefore to all the sensitive data that is stored (documents, passwords …). The names chosen for these two flaws reflect their scope, they are the absolute nightmare of security experts around the world, the door open to all trojan horses. All manufacturers have announced a series of patches to improve the safety of their computers.

In the inventory drawn by Apple, we can read about Spectre whose main danger lies in the execution of a Javascript code in a web browser (other applications seem relatively protected from malicious use). That’s why Apple and Google have announced the update of their main browsers, Safari and Chrome, to reduce the risk of exploitation. As we recently wrote, this reminds us that traditional browsers are two-way windows, it gives entry to both the large worldwide web and your computer and all its secrets.

Spectre Meltdown Browsers

Choose a browser like URbrowser, which takes the security and respect for your privacy as its top priority. Its “High Privacy” mode will preserve you from the intrusions generally found on other browsers, while offering you maximum browsing comfort.