Yes, nearly certainly you are.
While you're tinkering with browsers, you should also take advantage of this opportunity to dump outdated and unsafe browser plug-ins like Adobe Flash.
Below you can read the technical papers for both flaws. Hackers could use Meltdown or Spectre through a simple phishing email, or any trap to install their code, and could eventually seize the user's sensitive data.
That is good advice regardless of whether or not your phone has a flaw in the processor.
They are trying. Meltdown can be fixed by installing a software "patch" on the machine.
SAN JOSE Tech companies around the world are reeling and rushing to provide fixes for two microprocessor flaws that have put almost all the computing devices in the world at risk from hackers.
The two flaws "work on personal computers, mobile devices, and in the cloud", the researchers said. Meltdown is a flaw that affects processors made by Intel. "These new exploits leverage data about the proper operation of processing techniques common to modern computing platforms, potentially compromising security even though a system is operating exactly as it is created to", the company said.
Bullshit. While it has Meltdown covered, Chipzilla only has half of Spectre in its sights.
Apple confirms iPhone, Mac affected by Meltdown-Spectre vulnerabilities
Intel Corp on Wednesday confirmed a report stating that its semiconductors contain a vulnerability based around a chip-processing technique called speculative execution.
Beyond that, any explanation quickly becomes too technical and complicated to deal with here.
The scramble to harden a broad array of devices comes after researchers found two significant vulnerabilities within modern computing hardware, one of which can not be fully resolved as of yet.
The lawyers representing the Californian claimants think there will be more cases coming to light in the coming months, describing it as "one of the largest security flaws ever facing the American public".
As scary as Meltdown and Spectre may seem, they don't represent the first time we've had to clean up a computing mess - and probably won't be the last. Software companies are already rolling out patches to address these problems, so it's important to update your system immediately to stay safe.
Microsoft says the Xbox definitely isn't affected. Therefore, we recommend that ESET users keep track of any related patches for their systems and apply them as soon as possible. An upcoming Safari update will mitigate the risk, though it's unclear whether it will bring a similar feature to Chrome's "strict site isolation" or more simply hide the leaked data from potential attacks. From the physical premises to the purpose-built servers, networking equipment, and custom security chips to the low-level software stack running on every machine, our entire hardware infrastructure is Google-controlled, -secured, -built and -hardened.
Independent researchers separately discovered and named these vulnerabilities "Spectre" and "Meltdown".
Companies and organisations should be doing that anyway, such is the growing threat from cyber-crime and other attacks on systems.
"If you're going to disable this, then you're back to. many, many years ago, we're talking 10 years", he added.