{"id":654,"date":"2018-01-06T16:20:17","date_gmt":"2018-01-06T21:20:17","guid":{"rendered":"https:\/\/www.baronsoftware.com\/Blog\/?p=654"},"modified":"2018-01-06T16:20:17","modified_gmt":"2018-01-06T21:20:17","slug":"meltdown-spectre-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.baronsoftware.com\/Blog\/meltdown-spectre-vulnerabilities\/","title":{"rendered":"Meltdown and Spectre vulnerabilities"},"content":{"rendered":"<h2 style=\"text-align: center;\">Meltdown and Spectre vulnerabilities<\/h2>\n<p>Recently, two critical vulnerabilities were discovered in modern processors. Dubbed &#8220;Meltdown and Spectre&#8221;, these processor chip vulnerabilities are found on personal computers, mobile devices, and in the cloud.<br \/>\n<a href=\"https:\/\/www.symantec.com\/blogs\/threat-intelligence\/meltdown-spectre-cpu-bugs?om_em_cid=hho_email_US_BLST_ACT_RR_2018_01_Meltdown\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" data-attachment-id=\"655\" data-permalink=\"https:\/\/www.baronsoftware.com\/Blog\/meltdown-spectre-vulnerabilities\/download\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/download.png?fit=225%2C225&amp;ssl=1\" data-orig-size=\"225,225\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"download\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/download.png?fit=225%2C225&amp;ssl=1\" class=\"aligncenter wp-image-655 size-full\" src=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/download.png?resize=225%2C225&#038;ssl=1\" alt=\"\" width=\"225\" height=\"225\" srcset=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/download.png?w=225&amp;ssl=1 225w, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/download.png?resize=150%2C150&amp;ssl=1 150w\" sizes=\"(max-width: 225px) 100vw, 225px\" \/><\/a><\/p>\n<h2 style=\"text-align: center;\">What is Meltdown<\/h2>\n<p>Meltdown\u00a0exploits a flaw in out-of-order execution, a performance feature found in many modern processor chips. The researchers who discovered it have confirmed that it affects every Intel processor since 1995 (with the exception of pre-2013 Intel Itanium and Intel Atom processors). However, they added that it remains unclear whether ARM and AMD processors are also affected by the vulnerability.<\/p>\n<p>If successfully exploited, an attacker can obtain a copy of the entire kernel address space, including any mapped physical memory, in other words, any data stored in memory at the time of the attack.<\/p>\n<h2 style=\"text-align: center;\">What is Spectre<\/h2>\n<p>Spectre \u00a0has a similar outcome but works in a slightly different way, and exploits a flaw in processor design to trick an application into leaking information stored in memory.<\/p>\n<p>According to the team who discovered Spectre, virtually all modern processors are affected by the vulnerability, including Intel, AMD, and ARM chips. Once again, the vulnerability is operating system agnostic.<\/p>\n<p>Now, the best thing to do at this point is to make sure your workstations are up to date with anti-virus packages and be careful with installing applications from unknown vendors as well as attachments.<\/p>\n<h2 style=\"text-align: center;\">Get the latest Anti-virus package.<\/h2>\n<p>Baron Software does recommend using Symantec\/Norton anti-virus package due to the reliability and updates provided.\u00a0 The support team at Symantec works countless hours to provide security but you need to understand that if you allow a application to be installed then nothing will help you but a removal tool.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Meltdown and Spectre vulnerabilities Recently, two critical vulnerabilities were discovered in modern processors. Dubbed &#8220;Meltdown and Spectre&#8221;, these processor chip vulnerabilities are found on personal computers, mobile devices, and in the cloud. What is Meltdown Meltdown\u00a0exploits a flaw in out-of-order execution, a performance feature found in many modern processor chips. The researchers who discovered it [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":[],"rop_publish_now_history":[],"rop_publish_now_status":"pending","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[11,153],"tags":[],"class_list":["post-654","post","type-post","status-publish","format-standard","hentry","category-pc-tips-bits-bytes","category-news-items"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Meltdown and Spectre vulnerabilities<\/title>\n<meta name=\"description\" content=\"Recently, two critical vulnerabilities were discovered in modern processors. Dubbed &quot;Meltdown and Spectre&quot;, these processor chip vulnerabilities are found on personal computers, mobile devices, and in the cloud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.baronsoftware.com\/Blog\/meltdown-spectre-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Meltdown and Spectre vulnerabilities\" \/>\n<meta property=\"og:description\" content=\"Recently, two critical vulnerabilities were discovered in modern processors. Dubbed &quot;Meltdown and Spectre&quot;, these processor chip vulnerabilities are found on personal computers, mobile devices, and in the cloud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.baronsoftware.com\/Blog\/meltdown-spectre-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"Baron Software\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-06T21:20:17+00:00\" \/>\n<meta name=\"author\" content=\"richard@baronsoftware.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Meltdown and Spectre vulnerabilities\" \/>\n<meta name=\"twitter:description\" content=\"Recently, two critical vulnerabilities were discovered in modern processors. Dubbed &quot;Meltdown and Spectre&quot;, these processor chip vulnerabilities are found on personal computers, mobile devices, and in the cloud.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2014\/12\/logo.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:site\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"richard@baronsoftware.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/meltdown-spectre-vulnerabilities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/meltdown-spectre-vulnerabilities\\\/\"},\"author\":{\"name\":\"richard@baronsoftware.com\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/person\\\/079d370e4230be9d5f75885bb33dd8cd\"},\"headline\":\"Meltdown and Spectre vulnerabilities\",\"datePublished\":\"2018-01-06T21:20:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/meltdown-spectre-vulnerabilities\\\/\"},\"wordCount\":285,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/meltdown-spectre-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/download.png\",\"articleSection\":[\"Computer PC Tips - bits and bytes\",\"News Items\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/meltdown-spectre-vulnerabilities\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/meltdown-spectre-vulnerabilities\\\/\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/meltdown-spectre-vulnerabilities\\\/\",\"name\":\"Meltdown and Spectre vulnerabilities\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/meltdown-spectre-vulnerabilities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/meltdown-spectre-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/download.png\",\"datePublished\":\"2018-01-06T21:20:17+00:00\",\"description\":\"Recently, two critical vulnerabilities were discovered in modern processors. Dubbed \\\"Meltdown and Spectre\\\", these processor chip vulnerabilities are found on personal computers, mobile devices, and in the cloud.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/meltdown-spectre-vulnerabilities\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/meltdown-spectre-vulnerabilities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/meltdown-spectre-vulnerabilities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/download.png?fit=225%2C225&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/download.png?fit=225%2C225&ssl=1\",\"width\":225,\"height\":225},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/meltdown-spectre-vulnerabilities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Meltdown and Spectre vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#website\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\",\"name\":\"Baron Software\",\"description\":\"Highest Quality Software Developed.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\",\"name\":\"Baron Software\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i2.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i2.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"width\":1920,\"height\":400,\"caption\":\"Baron Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/Rbaroniunas\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/person\\\/079d370e4230be9d5f75885bb33dd8cd\",\"name\":\"richard@baronsoftware.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"caption\":\"richard@baronsoftware.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Meltdown and Spectre vulnerabilities","description":"Recently, two critical vulnerabilities were discovered in modern processors. Dubbed \"Meltdown and Spectre\", these processor chip vulnerabilities are found on personal computers, mobile devices, and in the cloud.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.baronsoftware.com\/Blog\/meltdown-spectre-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Meltdown and Spectre vulnerabilities","og_description":"Recently, two critical vulnerabilities were discovered in modern processors. Dubbed \"Meltdown and Spectre\", these processor chip vulnerabilities are found on personal computers, mobile devices, and in the cloud.","og_url":"https:\/\/www.baronsoftware.com\/Blog\/meltdown-spectre-vulnerabilities\/","og_site_name":"Baron Software","article_published_time":"2018-01-06T21:20:17+00:00","author":"richard@baronsoftware.com","twitter_card":"summary_large_image","twitter_title":"Meltdown and Spectre vulnerabilities","twitter_description":"Recently, two critical vulnerabilities were discovered in modern processors. Dubbed \"Meltdown and Spectre\", these processor chip vulnerabilities are found on personal computers, mobile devices, and in the cloud.","twitter_image":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2014\/12\/logo.jpg","twitter_creator":"@Rbaroniunas","twitter_site":"@Rbaroniunas","twitter_misc":{"Written by":"richard@baronsoftware.com","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.baronsoftware.com\/Blog\/meltdown-spectre-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/meltdown-spectre-vulnerabilities\/"},"author":{"name":"richard@baronsoftware.com","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd"},"headline":"Meltdown and Spectre vulnerabilities","datePublished":"2018-01-06T21:20:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/meltdown-spectre-vulnerabilities\/"},"wordCount":285,"commentCount":0,"publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/meltdown-spectre-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/download.png","articleSection":["Computer PC Tips - bits and bytes","News Items"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.baronsoftware.com\/Blog\/meltdown-spectre-vulnerabilities\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.baronsoftware.com\/Blog\/meltdown-spectre-vulnerabilities\/","url":"https:\/\/www.baronsoftware.com\/Blog\/meltdown-spectre-vulnerabilities\/","name":"Meltdown and Spectre vulnerabilities","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/meltdown-spectre-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/meltdown-spectre-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/download.png","datePublished":"2018-01-06T21:20:17+00:00","description":"Recently, two critical vulnerabilities were discovered in modern processors. Dubbed \"Meltdown and Spectre\", these processor chip vulnerabilities are found on personal computers, mobile devices, and in the cloud.","breadcrumb":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/meltdown-spectre-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.baronsoftware.com\/Blog\/meltdown-spectre-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/meltdown-spectre-vulnerabilities\/#primaryimage","url":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/download.png?fit=225%2C225&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/download.png?fit=225%2C225&ssl=1","width":225,"height":225},{"@type":"BreadcrumbList","@id":"https:\/\/www.baronsoftware.com\/Blog\/meltdown-spectre-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.baronsoftware.com\/Blog\/"},{"@type":"ListItem","position":2,"name":"Meltdown and Spectre vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.baronsoftware.com\/Blog\/#website","url":"https:\/\/www.baronsoftware.com\/Blog\/","name":"Baron Software","description":"Highest Quality Software Developed.","publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.baronsoftware.com\/Blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization","name":"Baron Software","url":"https:\/\/www.baronsoftware.com\/Blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/","url":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","contentUrl":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","width":1920,"height":400,"caption":"Baron Software"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Rbaroniunas"]},{"@type":"Person","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd","name":"richard@baronsoftware.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","caption":"richard@baronsoftware.com"}}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2e6qU-ay","jetpack-related-posts":[{"id":677,"url":"https:\/\/www.baronsoftware.com\/Blog\/critical-sql-server-patches-meltdown-spectre\/","url_meta":{"origin":654,"position":0},"title":"Critical SQL Server Patches for Meltdown and Spectre","author":"richard@baronsoftware.com","date":"January 10, 2018","format":false,"excerpt":"Critical SQL Server Patches for Meltdown and Spectre There are two new possible viruses Meltdown and Spectre that can lead to dangerous situations on your SQL server by attacks. The following summary allows you to review and decide how to patch your systems.\u00a0 All SQL DBAs need to take action\u2026","rel":"","context":"In &quot;Microsoft Development&quot;","block_context":{"text":"Microsoft Development","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/microsoft-development\/"},"img":{"alt_text":"Microsoft SQL Server 2016","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/03\/microsoft-sql-server-2016.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":772,"url":"https:\/\/www.baronsoftware.com\/Blog\/microsoft-outlook-affected-spectre-meltodown-bug\/","url_meta":{"origin":654,"position":1},"title":"Microsoft Outlook could be affected by the Spectre-Meltdown bug","author":"richard@baronsoftware.com","date":"February 16, 2018","format":false,"excerpt":"Microsoft Outlook could be affected by the Spectre-Meltdown bug The February updates address security flaws in Internet Explorer, Edge, Microsoft's ChakraCore JavaScript engine, Windows, and Office. Two worrying bugs fixed this month affected Outlook. One, a memory-corruption flaw, identified as CVE-2018-0852, could allow an attacker to run arbitrary code.\u00a0 \u00a0Microsoft\u2026","rel":"","context":"In &quot;Microsoft Development&quot;","block_context":{"text":"Microsoft Development","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/microsoft-development\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":660,"url":"https:\/\/www.baronsoftware.com\/Blog\/microsoft-releases-powershell-script-purpose-testing-meltdown-spectre\/","url_meta":{"origin":654,"position":2},"title":"Microsoft releases PowerShell script for purpose of testing of Meltdown and Spectre","author":"richard@baronsoftware.com","date":"January 8, 2018","format":false,"excerpt":"Microsoft releases PowerShell script for purpose of testing of Meltdown and Spectre With the latest news concerning the possible attacks within your computer hardware Microsoft has jumped on providing a PowerShell Script to give a user basic knowledge whether they are vulnerable.\u00a0 Baron Software followed the guidelines and can attest\u2026","rel":"","context":"In &quot;Computer PC Tips - bits and bytes&quot;","block_context":{"text":"Computer PC Tips - bits and bytes","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/pc-tips-bits-bytes\/"},"img":{"alt_text":"PowerShell","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/10\/microsofts-logo-gets-a-makeover-300x225.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":874,"url":"https:\/\/www.baronsoftware.com\/Blog\/meltdown-patch-opened-bigger-security-hole-on-windows-7\/","url_meta":{"origin":654,"position":3},"title":"Meltdown Patch Opened Bigger Security Hole on Windows 7","author":"richard@baronsoftware.com","date":"April 1, 2018","format":false,"excerpt":"Meltdown Patch Opened Bigger Security Hole on Windows 7 Microsoft's Meltdown patch has opened an even bigger security hole on Windows 7, allowing any user-level application to read content from the operating system's kernel, and even write data to kernel memory. Swedish IT security expert Ulf Frisk made the discovery\u2026","rel":"","context":"In &quot;Microsoft Development&quot;","block_context":{"text":"Microsoft Development","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/microsoft-development\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1-300x62.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":808,"url":"https:\/\/www.baronsoftware.com\/Blog\/latest-utorrent-bug-can-control-computer-steal-downloads\/","url_meta":{"origin":654,"position":4},"title":"Latest uTorrent bug can control your computer to steal downloads","author":"richard@baronsoftware.com","date":"February 24, 2018","format":false,"excerpt":"Latest uTorrent bug can control your computer to steal downloads Two versions of uTorrent, one of the Internet's most widely used BitTorrent apps, have easy to exploit vulnerabilities that allow attackers to execute code, access downloaded files, and snoop on download histories recently discovered by a Google researcher. uTorrent developers\u2026","rel":"","context":"In &quot;News Items&quot;","block_context":{"text":"News Items","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/news-items\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1-300x62.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":926,"url":"https:\/\/www.baronsoftware.com\/Blog\/new-apple-mac-books-are-having-serious-issues\/","url_meta":{"origin":654,"position":5},"title":"New Apple Mac Books are having serious issues","author":"richard@baronsoftware.com","date":"July 20, 2018","format":false,"excerpt":"New Apple Mac Books are having serious issues Apple has been experiencing customers complaining and returning the latest MacBook Pro due to a slew of issues.\u00a0 \u00a0The product returns have been numerous and it seems that the issues must be addressed sooner than later. Apple\u2019s new MacBook Pro comes with\u2026","rel":"","context":"In &quot;Hardware Reviews&quot;","block_context":{"text":"Hardware Reviews","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/hardware-reviews\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/Apple.jpeg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/comments?post=654"}],"version-history":[{"count":1,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/654\/revisions"}],"predecessor-version":[{"id":656,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/654\/revisions\/656"}],"wp:attachment":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/media?parent=654"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/categories?post=654"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/tags?post=654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}