The Spectre of a Meltdown? How to Avoid the Latest Cybersecurity Threats

Publication
January 9, 2018

With names reminiscent of those of movie villains, the "Meltdown" and "Spectre" computer flaws pose dire real-world risks to computers, devices and networks worldwide.

"Meltdown" is a flaw that affects only computers and server equipment that use Intel chips or processors. It essentially offers hackers a "back door" to access a computer's memory and anything saved in that memory, including passwords saved in Web browsers for frequently visited websites.

The "Spectre" flaw affects chips in smartphones and tablets, in addition to Intel's computer chips and those from Advanced Micro Devices, Inc. Spectre allows hackers to manipulate apps to cause them to leak sensitive information. While researchers suggest that Spectre may be less dangerous than Meltdown, because of the number of devices affected across multiple platforms, Spectre may prove more difficult to patch. The only known device that may be immune to the Spectre flaw is the Apple Watch.

There are no known breaches as a result of Meltdown or Spectre yet. Nonetheless, the risk is so serious that Microsoft, Apple and Linux have all issued security alerts, and have issued, or are issuing, security updates and patches to protect computers, servers and devices.

What can your company do to protect itself?

First, download immediately all security updates and/or patches that the manufacturers of your company's computers, equipment and networks offer. Do not wait.

Second, delete all saved passwords stored on your company's web browsers. Consider changing all employee passwords as soon as the security patches are installed.

While Meltdown and Spectre may increase your risk of external penetration, the greatest known risk to your company's cybersecurity is not external - it's your employees. Take the following measures to minimize the risks:

  • Remind your employees not to use their company passwords to log in to any other sites, not to share their passwords with anyone, and never to store or save their passwords on Internet browsers connected to your company.
  • Prohibit your employees from downloading or transferring files, software or other material from personal computers onto your company's computers or networks. This will prevent infected files from migrating onto your system.
  • Remind your employees not to click on links in, or open documents attached to, emails, without checking with your IT department first. Phishing remains the most common method for hackers to access computer systems.

 

Related Practices
RELATED PEOPLE
YOU MIGHT ALSO LIKE
Blog March 6, 2026
Florida has earned an “A” grade in the first-ever U.S. P3 Report Card, published by P3 Bulletin and the Global Infrastructure Investor Association (GIIA). The report recognizes Florida as one of the nation’s leading markets for public-private partnerships, citing its strong legal f...
Press Release March 6, 2026
Bilzin Sumberg is proud to announce that Partners Josh A. Kaplan and David S. Resnick have been elevated to serve as Co-Heads of the firm’s Joint Venture Practice, further strengthening the firm’s capabilities in structuring complex real estate and corporate joint venture transactions.
Awards March 5, 2026
Bilzin Sumberg has awarded the 2025 Martin A. Schwartz Mentor of the Award to Real Estate Partner James Shindell and to the late Shawn Wolf, former Practice Group Leader for Tax & Private Wealth, in recognition for their commitment to mentoring junior attorneys at the firm.
VIEW MORE