<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.creatorscripts.com/blogs/tag/spectre/feed" rel="self" type="application/rss+xml"/><title>Creator Scripts. - Zoho Blogs #Spectre</title><description>Creator Scripts. - Zoho Blogs #Spectre</description><link>https://www.creatorscripts.com/blogs/tag/spectre</link><lastBuildDate>Thu, 09 Apr 2026 07:43:45 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[What you need to know about the Spectre and Meltdown Hardware Vulnerability]]></title><link>https://www.creatorscripts.com/blogs/post/What-you-need-to-know-about-the-Spectre-and-Meltdown-Hardware-Vulnerability</link><description><![CDATA[Some of you have probably read about recent hardware vulnerabilities, named Spectre and Meltdown, that appear to be present in almost all modern proce ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_b0Ys1HXNRkOxFWj-6ZMBOA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_l5Gqd6l_SmaZWqqtE9cvjg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_r0AYaKd_RRaw9G8lgjsxgA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_LPbh4FMcRyKjvGpqP8xpTA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align- " data-editor="true"><div><p><span></span></p><p class="zw-paragraph heading0" style="font-size:18px;margin-bottom:30px;">Some of you have probably read about recent hardware vulnerabilities, named Spectre and Meltdown, that appear to be present in almost all modern processors. We wanted to give you an update and our position on this.</p><p class="zw-paragraph heading0" style="font-size:18px;margin-bottom:30px;">Let’s explain this quickly in lay-person terms. All modern processors use a technique called “speculative execution” to speed up tasks. That is, processors execute instructions even before they are sure those instructions need to be executed. The idea is to anticipate what the user might do and allow the processor to get ahead of the game, thereby improving user performance.</p><p class="zw-paragraph heading0" style="font-size:18px;margin-bottom:30px;">It now looks like this technique is not perfect in enforcing trust boundaries. This may allow malicious code to cross trust boundaries and read system memory that may hold sensitive information. This is the core of the Spectre issue and is common to all modern processors. The Meltdown issue is related primarily to processors from Intel and stems from a different cause, with the same consequence of allowing malicious code to cross trust boundaries.</p><p class="zw-paragraph heading0" style="font-size:18px;margin-bottom:30px;">As of January 5, the U.S. Computer Emergency Readiness Team said that while the flaws “could allow an attacker to obtain access to sensitive information,” it’s not so far aware of anyone having done so.</p><p class="zw-paragraph heading0" style="font-size:18px;margin-bottom:30px;">Zoho is aware of these vulnerabilities and their impact. Our processes already put some safeguards in place. Our production systems do not depend on isolation provided by the hardware processors for customer data protection. Zoho does not allow arbitrary third-party code to be deployed within our systems,&nbsp;potentially limiting the scope of any exploits. So customer data is not exposed because of this class of vulnerabilities, exploitable by third-party code.</p><p class="zw-paragraph heading0" style="font-size:18px;margin-bottom:30px;">That said, we are working with our vendors to test the initial software patches they have released and to roll these out into our development and production environments.</p><p class="zw-paragraph heading0" style="font-size:18px;margin-bottom:30px;"><b>Additional Reading:</b></p><p class="zw-paragraph heading0" style="font-size:18px;margin-bottom:30px;"><a href="https://arstechnica.com/gadgets/2018/01/meltdown-and-spectre-heres-what-intel-apple-microsoft-others-are-doing-about-it/">ArcTechnica</a>: General article explaining the issue and what vendors are doing</p><p class="zw-paragraph heading0" style="font-size:18px;margin-bottom:30px;"><a href="https://meltdownattack.com">Meltdown.com</a>: Explanations and links</p><p class="zw-paragraph heading0" style="font-size:18px;margin-bottom:30px;"><a href="https://googleprojectzero.blogspot.in/2018/01/reading-privileged-memory-with-side.html">Google Blog Entry</a>: Technical explanation</p><p></p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 05 Jan 2018 20:14:40 -0600</pubDate></item></channel></rss>