{"id":74005,"date":"2018-01-08T08:23:45","date_gmt":"2018-01-08T16:23:45","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=74005"},"modified":"2023-10-27T14:03:24","modified_gmt":"2023-10-27T21:03:24","slug":"meltdown-and-spectre-what-apple-users-need-to-know","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/","title":{"rendered":"Meltdown and Spectre: What Apple users need to know"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter wp-image-74008\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/meltdown-spectre-apple.png\" alt=\"Meltdown and Spectre vulnerabilities\" width=\"600\" height=\"338\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/meltdown-spectre-apple.png 5937w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/meltdown-spectre-apple-150x84.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/meltdown-spectre-apple-300x169.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/meltdown-spectre-apple-768x432.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/meltdown-spectre-apple-1024x576.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/meltdown-spectre-apple-657x370.png 657w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>You&#8217;ve probably heard something about &#8220;<strong>Meltdown<\/strong>&#8221; and &#8220;<strong>Spectre<\/strong>,&#8221; perhaps even in the mainstream media, and you\u00a0likely\u00a0heard that it has something to do with an Intel security flaw.<\/p>\n<p>But do you know how it affects <strong><em>your<\/em> Apple devices<\/strong>\u2014your Mac, iPhone, iPad, iPod touch, Apple Watch, or Apple TV\u2014and what actions you may need to take to stay safe?<\/p>\n<p>Never fear, that&#8217;s why we&#8217;re here! It&#8217;s a complex problem, but we&#8217;ll break it down and share the main tidbits about these vulnerabilities you need to know as a user of Apple products.<\/p>\n<h3>What\u00a0are Meltdown and Spectre?<\/h3>\n<p>On Monday, January 1, 2018, a developer blog, called &#8220;python sweetness,&#8221; <a href=\"http:\/\/pythonsweetness.tumblr.com\/post\/169166980422\/the-mysterious-case-of-the-linux-page-table\" target=\"_blank\" rel=\"noopener\">brought to light<\/a>\u00a0an issue in which\u00a0&#8220;there is presently an embargoed security bug impacting apparently all contemporary CPU [central processing unit] architectures that implement virtual memory, requiring hardware changes to fully resolve.&#8221;<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-74011\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Intel-i7-via-flickr_com-photos-intel_de-9662276651-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Intel-i7-via-flickr_com-photos-intel_de-9662276651-300x300.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Intel-i7-via-flickr_com-photos-intel_de-9662276651-150x150.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Intel-i7-via-flickr_com-photos-intel_de-9662276651-32x32.jpg 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Intel-i7-via-flickr_com-photos-intel_de-9662276651-50x50.jpg 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Intel-i7-via-flickr_com-photos-intel_de-9662276651-64x64.jpg 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Intel-i7-via-flickr_com-photos-intel_de-9662276651-96x96.jpg 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Intel-i7-via-flickr_com-photos-intel_de-9662276651-128x128.jpg 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Intel-i7-via-flickr_com-photos-intel_de-9662276651.jpg 640w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>The Register published <a href=\"https:\/\/www.theregister.co.uk\/2018\/01\/02\/intel_cpu_design_flaw\/\" target=\"_blank\" rel=\"noopener\">an article<\/a>\u00a0the following day\u00a0that emphasized the design flaw with regard to Intel processors, and from there snowballed into a worldwide discussion about a serious flaw in Intel CPUs that had major security implications.<\/p>\n<p>Macs, along with the vast majority of the world&#8217;s Windows and Linux PCs, use Intel processors.<\/p>\n<p>As more information came to light in the subsequent days, it became clear that more than just Intel CPUs are affected; there are also implications for other processor architectures, including AMD processors as well as ARM-based processors like those\u00a0found in Apple&#8217;s iPhones and iPads.<\/p>\n<p>It turns out that Intel and a handful of software development giants, among them Apple, Microsoft, and the Linux kernel developers, have known about the design flaw since at least November 2017 and have been working behind the scenes to prepare for a coordinated public disclosure and remediation of the issue. (At least, that was the plan until &#8220;python sweetness&#8221; and The Register brought the issue out of obscurity and into the public spotlight.)<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-large wp-image-74014\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Meltdown-Spectre-1024x570.png\" alt=\"\" width=\"512\" height=\"285\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Meltdown-Spectre-1024x570.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Meltdown-Spectre-150x84.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Meltdown-Spectre-300x167.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Meltdown-Spectre-768x428.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Meltdown-Spectre-657x366.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Meltdown-Spectre.png 1492w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/p>\n<p>&#8220;Meltdown&#8221; and &#8220;Spectre&#8221; are nicknames for techniques that can enable an attacker to access computer memory that shouldn&#8217;t be accessible; this is accomplished by abusing a technology called &#8220;speculative execution.&#8221;<\/p>\n<p>Speculative execution is a processing feature that enables computing devices to run faster by predicting what will happen next in an app, and preemptively working toward multiple possible outcomes all at once.<\/p>\n<p>The end result of leveraging Meltdown and Spectre could include leaks of sensitive data such as passwords and credit card information, among other things.<\/p>\n<h3>What do all these names mean?<\/h3>\n<p>A vulnerability may be known by many names.<\/p>\n<p>Perhaps the broadest term for the vulnerabilities in question would be &#8220;speculative execution vulnerabilities.&#8221;<\/p>\n<p>&#8220;<strong>Meltdown<\/strong>&#8221; and &#8220;<strong>Spectre<\/strong>&#8221; are the main names that have caught on in association with this bug; each of these are\u00a0unique and will be described further in their own sections below.<\/p>\n<p>When the story broke, it was at first being discussed online under the name <strong>KPTI<\/strong> in reference to <a href=\"https:\/\/en.wikipedia.org\/wiki\/Kernel_page-table_isolation\" target=\"_blank\" rel=\"noopener\">Kernel Page-table Isolation<\/a>\u00a0(formerly called <strong>KAISER<\/strong>), a feature of the Linux kernel that mitigates the Meltdown vulnerability.<\/p>\n<p>There&#8217;s also a not-safe-for-work nickname that was reportedly conceived by the Linux kernel team: <strong>F***WIT<\/strong> (which stands for &#8220;Forcefully Unmap Complete Kernel With Interrupt Trampolines&#8221;).<\/p>\n<p>You may also see references to &#8220;CVE&#8221; numbers associated with these bugs. CVE stands for Common Vulnerabilities and Exposures, and CVE numbers are used for the purpose of tracking the same bug across multiple vendors and media outlets, as bugs tend to be described in many different ways and may have various nicknames.<\/p>\n<h3>What is Meltdown?<\/h3>\n<p><strong>Meltdown<\/strong>\u00a0is the nickname for one of\u00a0two major categories of exploits at this time. It\u00a0may also be referred to as the &#8220;rogue data cache load&#8221; technique, or <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-5754\" target=\"_blank\" rel=\"noopener\">CVE-2017-5754<\/a>.<\/p>\n<p>Successful exploitation could allow an attacker&#8217;s code running in a user-privileged app to read kernel (superuser-privileged) memory.<\/p>\n<p>Apple\u00a0<a href=\"https:\/\/support.apple.com\/en-us\/HT208394\" target=\"_blank\" rel=\"noopener\">said<\/a>\u00a0that its own\u00a0analysis suggested that the Meltdown exploitation technique &#8220;has the most potential to be exploited&#8221;\u00a0as compared with the Spectre exploitation techniques.<\/p>\n<h3>What is Spectre?<\/h3>\n<p>The other exploitation techniques are known collectively as <strong>Spectre<\/strong> (sometimes spelled Specter). The two techniques may be referred to as &#8220;bounds check bypass&#8221; or <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-5753\" target=\"_blank\" rel=\"noopener\">CVE-2017-5753<\/a>, and &#8220;branch target injection&#8221; or <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-5715\" target=\"_blank\" rel=\"noopener\">CVE-2017-5715<\/a>.<\/p>\n<p>From Apple&#8217;s <a href=\"https:\/\/support.apple.com\/en-us\/HT208394\" target=\"_blank\" rel=\"noopener\">public statement<\/a>:<\/p>\n<blockquote><p>&#8220;Analysis of these techniques revealed that while they are extremely difficult to exploit, even by an app running locally on a Mac or iOS device, they can be potentially exploited in JavaScript running in a web browser. Apple will release an update for Safari on macOS and iOS in the coming days to mitigate these exploit techniques.&#8221;<\/p><\/blockquote>\n<p>In other words,\u00a0Web pages in an unpatched browser can potentially exploit Spectre.<\/p>\n<h3>Is my Apple device safe from Meltdown?<\/h3>\n<p>If your Apple device is running one of the following operating systems, you&#8217;re already (at least partially) protected against Meltdown attacks:<\/p>\n<ul>\n<li>macOS 10.13.2 or later<\/li>\n<li>iOS 11.2 or later<\/li>\n<li>tvOS 11.2 or later<\/li>\n<li>watchOS<\/li>\n<\/ul>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-74020\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/psp-mini-hero-macos-high-sierra-whats-new_2x-150x150.png\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/psp-mini-hero-macos-high-sierra-whats-new_2x-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/psp-mini-hero-macos-high-sierra-whats-new_2x-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/psp-mini-hero-macos-high-sierra-whats-new_2x-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/psp-mini-hero-macos-high-sierra-whats-new_2x-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/psp-mini-hero-macos-high-sierra-whats-new_2x-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/psp-mini-hero-macos-high-sierra-whats-new_2x-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/psp-mini-hero-macos-high-sierra-whats-new_2x.png 300w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>It&#8217;s important to note that Apple often releases security-only updates for the two previous versions of macOS, in this case Sierra and El Capitan. However, Apple has not given\u00a0any indication\u00a0that updates for Sierra or El Capitan are forthcoming.<\/p>\n<p>Thus,\u00a0if you have an older version of macOS (or OS X), you&#8217;ll need to upgrade to macOS High Sierra version 10.13.2 or later\u00a0to protect against Meltdown attacks. (You may need to first\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-mac-cant-run-macos-sierra\/\" target=\"_blank\" rel=\"noopener\">find out whether your Mac can be upgraded<\/a>.)<\/p>\n<p>Apple has indicated that macOS High Sierra version 10.13.3 is in the works and will include further protections against Meltdown attacks, so be sure to install it when it becomes available.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-74017\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Apple-Watch-Security-cropped-100x150.png\" alt=\"\" width=\"100\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Apple-Watch-Security-cropped-100x150.png 100w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Apple-Watch-Security-cropped.png 200w\" sizes=\"(max-width: 100px) 100vw, 100px\" \/>According to Apple, &#8220;Apple Watch is not affected by either Meltdown or Spectre.&#8221;<\/p>\n<p>Apple specifically <a href=\"https:\/\/support.apple.com\/en-us\/HT208394\" target=\"_blank\" rel=\"noopener\">claims<\/a>\u00a0&#8220;watchOS did not require mitigation&#8221; for Meltdown, while &#8220;watchOS is unaffected by Spectre.&#8221;<\/p>\n<p>The company\u00a0has not offered further explanation as to why watchOS, which shares much of its codebase with iOS, allegedly does not require mitigations.<\/p>\n<h3>Is my Apple device safe from Spectre?<\/h3>\n<p>In short: <del><strong>no, not yet<\/strong><\/del> (see editor&#8217;s update below for details).<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-73090\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Safari-iOS-icon-150x150.png\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Safari-iOS-icon-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Safari-iOS-icon-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Safari-iOS-icon-768x768.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Safari-iOS-icon-657x657.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Safari-iOS-icon-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Safari-iOS-icon-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Safari-iOS-icon-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Safari-iOS-icon-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Safari-iOS-icon-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Safari-iOS-icon.png 1024w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>Apple is planning to release a Safari update for both macOS and iOS &#8220;in the coming days,&#8221; so stay tuned for that. Once the updates are available, you&#8217;ll find the Mac update in the Mac App Store app under Updates, and you&#8217;ll find the iOS update in the <strong>Settings<\/strong> app under <strong>General<\/strong> &gt; <strong>Software Update<\/strong>.<\/p>\n<p>If you use a third-party browser such as Firefox or Chrome, you&#8217;ll want to install any new updates that get released this month.<\/p>\n<p>Firefox 57.0.4 is already out and includes mitigations for Spectre.\u00a0You can check for updates by going to the Firefox menu and selecting About Firefox, or you can <a href=\"https:\/\/www.mozilla.org\/en-US\/firefox\/\" target=\"_blank\" rel=\"noopener\">download a fresh copy<\/a> of the app.<\/p>\n<p>Meanwhile, Google isn&#8217;t planning to update Chrome until around January 23, according to <a href=\"http:\/\/fortune.com\/2018\/01\/05\/spectre-safari-chrome-firefox-internet-explorer\/\" target=\"_blank\" rel=\"noopener\">Fortune<\/a>.\u00a0However, Chrome users who wish to be protected\u00a0can\u00a0follow a <a href=\"https:\/\/support.google.com\/chrome\/answer\/7623121\" target=\"_blank\" rel=\"noopener\">manual process<\/a>\u00a0to enable a Spectre mitigation (note, however, that doing so will increase Chrome&#8217;s memory consumption\u00a0by about 10\u201320%).<\/p>\n<p>Until Apple and Google release patches,\u00a0it&#8217;s probably safest to\u00a0use <a href=\"https:\/\/www.mozilla.org\/en-US\/firefox\/\" target=\"_blank\" rel=\"noopener\">Firefox 57.0.4 or later<\/a> on your Mac,\u00a0and avoid using Safari or Chrome for now.<\/p>\n<p>As for iOS devices (iPhone, iPad, and iPod touch), there doesn&#8217;t seem to be a\u00a0safe alternative browser, so you&#8217;ll just have to wait patiently for Apple&#8217;s\u00a0forthcoming update. If you&#8217;re concerned, you\u00a0may wish to avoid\u00a0logging into sites or\u00a0entering any passwords or sensitive information\u00a0in\u00a0Safari or other mobile browsers for iOS, and instead opt to use your Mac for Web browsing until Apple updates iOS.<\/p>\n<p><strong>Editor&#8217;s Update, January 8:<\/strong> Apple has released security updates for macOS High Sierra, Safari and iOS\u00a0to mitigate Spectre.<\/p>\n<p><a href=\"https:\/\/support.apple.com\/en-us\/HT208397\" target=\"_blank\" rel=\"noopener\">macOS High Sierra 10.13.2 Supplemental Update<\/a> includes security improvements to Safari and Webkit to mitigate the effects of Spectre (CVE-2017-5753 and CVE-2017-5715). Apple notes, &#8220;Installing macOS High Sierra 10.13.2 Supplemental Update will update Safari to version 11.0.2 (13604.4.7.1.6) or version 11.0.2 (13604.4.7.10.6).&#8221;<\/p>\n<p><a href=\"https:\/\/support.apple.com\/en-us\/HT208324\" target=\"_blank\" rel=\"noopener\">Safari 11.0.2<\/a> is available for OS X El Capitan 10.11.6, macOS Sierra 10.12.6, and macOS High Sierra 10.13.2.<\/p>\n<p>To check the version of Safari installed on your Mac:<\/p>\n<ol>\n<li>Open Safari<\/li>\n<li>Choose Safari &gt; About Safari<\/li>\n<\/ol>\n<p><a href=\"https:\/\/support.apple.com\/en-us\/HT208401\" target=\"_blank\" rel=\"noopener\">iOS 11.2.2<\/a> is available for iPhone 5s and later, iPad Air and later, and iPod touch 6th generation. &#8220;iOS 11.2.2 includes security improvements to Safari and Webkit to mitigate the effects of Spectre,&#8221; according to\u00a0Apple&#8217;s security notice.<\/p>\n<h3>Will Apple update Macs&#8217; EFI firmware?<\/h3>\n<p>It\u00a0remains to be seen whether Apple will release EFI firmware updates for Macs to more fully address the issue closer to the hardware level.<\/p>\n<p>Noting that Apple did not say anything about EFI in its <a href=\"https:\/\/support.apple.com\/en-us\/HT208394\" target=\"_blank\" rel=\"noopener\">public statement<\/a>, we reached out to Apple to inquire about whether EFI updates are forthcoming. Apple&#8217;s Todd Wilder responded\u00a0with the following statement:<\/p>\n<blockquote><p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-74023\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Apple_logo_black-122x150.png\" alt=\"\" width=\"65\" height=\"80\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Apple_logo_black-122x150.png 122w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Apple_logo_black-244x300.png 244w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Apple_logo_black-657x806.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Apple_logo_black.png 756w\" sizes=\"(max-width: 65px) 100vw, 65px\" \/>&#8220;We no longer distinguish between EFI updates and OS updates for the Mac. We will be applying mitigations wherever in the stack it is necessary, and customers will receive those updates in the form of macOS updates.&#8221;<\/p><\/blockquote>\n<p>In other words, if\u00a0Apple does\u00a0decide that it&#8217;s\u00a0necessary\u00a0to\u00a0release EFI firmware updates for\u00a0any\u00a0Macs, those updates would be bundled with a future\u00a0version of\u00a0macOS High Sierra or later, rather than published as a distinct and separate update.<\/p>\n<h3>Will my device be slower after I update?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-72217\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/antivirus-scanning-slow-mac-150x83.jpg\" alt=\"\" width=\"150\" height=\"83\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/antivirus-scanning-slow-mac-150x83.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/antivirus-scanning-slow-mac-300x165.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/antivirus-scanning-slow-mac.jpg 500w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>Early\u00a0reports <a href=\"https:\/\/www.theregister.co.uk\/2018\/01\/02\/intel_cpu_design_flaw\/\" target=\"_blank\" rel=\"noopener\">suggested<\/a> that by disabling speculative execution functionality, certain system functions may be anywhere from 5 to 30\u00a0percent\u00a0slower.<\/p>\n<p>Apple <a href=\"https:\/\/support.apple.com\/en-us\/HT208394\" target=\"_blank\" rel=\"noopener\">claims<\/a> that its Meltdown and Spectre mitigations do not cause such serious performance degradation.<\/p>\n<p>According to Apple, the Meltdown mitigations already in place in macOS 10.13.2, iOS 11.2, and tvOS 11.2 &#8220;resulted in no measurable reduction in \u2026 performance.&#8221;<\/p>\n<p>However, Apple\u00a0indicates that its upcoming mitigations for Spectre in Safari may have a performance impact of less than 2.5% in one particular benchmark, while other benchmarks see no measurable reduction in performance.<\/p>\n<p>In short,\u00a0your Apple device\u00a0probably won&#8217;t feel slower as a result of Apple&#8217;s Meltdown and Spectre mitigations. (Your iOS device\u00a0might, however, feel slower for <a href=\"https:\/\/www.macrumors.com\/2018\/01\/05\/apple-faces-23-lawsuits-for-iphone-slowdowns\/\" target=\"_blank\" rel=\"noopener\">other reasons<\/a>.)<\/p>\n<h3>Is there anything else I should know?<\/h3>\n<p>Absolutely. First of all, this is a developing story, so\u00a0expect further plot twists. It&#8217;s very likely that we\u00a0still don&#8217;t know all of the ramifications of the flaws in speculative execution processor technology.<\/p>\n<p><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" class=\"alignright size-full wp-image-71419\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A.png\" alt=\"\" width=\"125\" height=\"125\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A.png 216w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A-128x128.png 128w\" sizes=\"(max-width: 125px) 100vw, 125px\" \/><\/a>There&#8217;s a <strong>special episode of the <a href=\"http:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\">Intego Mac Podcast<\/a><\/strong> coming next Wednesday, January 10, in which Kirk McElhearn and I further discuss the topic and explain what speculative execution means. Be sure to\u00a0<strong>subscribe now<\/strong>\u00a0<a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\">in iTunes\/Podcasts<\/a>\u00a0or in your favorite podcatcher to make sure you get the Meltdown\/Spectre episode when it becomes available.<\/p>\n<p><strong>If you own or support any Windows systems<\/strong>\u00a0(including if you run Windows\u00a0on your Mac, either via Boot Camp or via virtual machine software such as VMware Fusion, Parallels Desktop, or Oracle VirtualBox), be sure to install the latest Windows updates from Microsoft. <img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-74026\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Windows-BSOD-Apple-icon-150x150.png\" alt=\"Apple's icon depicting Windows Blue Screen of Death\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Windows-BSOD-Apple-icon-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Windows-BSOD-Apple-icon-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Windows-BSOD-Apple-icon-768x768.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Windows-BSOD-Apple-icon-657x657.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Windows-BSOD-Apple-icon-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Windows-BSOD-Apple-icon-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Windows-BSOD-Apple-icon-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Windows-BSOD-Apple-icon-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Windows-BSOD-Apple-icon-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Windows-BSOD-Apple-icon.png 1024w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>Note that systems running <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4056897\/windows-7-update-kb4056897\" target=\"_blank\" rel=\"noopener\">Windows 7 (or Server 2008 R2)<\/a>\u00a0or\u00a0<a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4056898\/windows-81-update-kb4056898\" target=\"_blank\" rel=\"noopener\">Windows 8.1 (or Server 2012 R2)<\/a>\u00a0may need to manually download and apply the patch, since it may not\u00a0appear in Windows Update; meanwhile,\u00a0<a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4056890\/windows-10-update-kb4056890\" target=\"_blank\" rel=\"noopener\">Windows 10 (and Server 2016)<\/a>\u00a0users should get the update as part of the usual patch cycle. Make sure your Windows anti-virus is fully up to date before you install the Windows patches.<\/p>\n<p>Windows PCs\u00a0may also need BIOS\/UEFI firmware updates in order to be better protected. Not all PC manufacturers have given information about which PC models will be receiving updates, and some older PCs simply won&#8217;t be getting BIOS updates.\u00a0If you&#8217;re running Windows\u00a0via a virtual machine on\u00a0your Mac, check with your\u00a0VM vendor to see whether\u00a0a new version\u00a0may be needed\u00a0(VMware has released a <a href=\"https:\/\/www.vmware.com\/us\/security\/advisories\/VMSA-2018-0002.html\" target=\"_blank\" rel=\"noopener\">public statement<\/a>, but Parallels and Oracle have not yet).<\/p>\n<h3>Additional Resources<\/h3>\n<p>If you&#8217;d like to learn more about\u00a0the\u00a0speculative execution vulnerabilities, the following resources may be useful:<\/p>\n<ul>\n<li>Apple\u00a0has issued a <a href=\"https:\/\/support.apple.com\/en-us\/HT208394\" target=\"_blank\" rel=\"noopener\">statement<\/a> titled &#8220;About speculative execution vulnerabilities in ARM-based and Intel CPUs&#8221;<\/li>\n<li><a href=\"https:\/\/meltdownattack.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/meltdownattack.com<\/a> is the &#8220;official&#8221; Meltdown and Spectre information site<\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/list-of-meltdown-and-spectre-vulnerability-advisories-patches-and-updates\/\" target=\"_blank\" rel=\"noopener\">Bleeping Computer<\/a> and <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2018\/01\/04\/google-microsoft-apple-updates-for-meltdown-spectre-intel-processor-vulnerabilities\/\" target=\"_blank\" rel=\"noopener\">Forbes<\/a> have both attempted comprehensive lists of vendor updates, although neither list is complete\u00a0(neither links to BIOS updates, for example)<\/li>\n<\/ul>\n<h3>Final Thoughts<\/h3>\n<p style=\"text-align: center;\"><img loading=\"lazy\" class=\"aligncenter size-large wp-image-74029\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/xkcd-1938_meltdown_and_spectre_2x-1024x987.png\" alt=\"xkcd #1938: Meltdown and Spectre\" width=\"512\" height=\"494\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/xkcd-1938_meltdown_and_spectre_2x-1024x987.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/xkcd-1938_meltdown_and_spectre_2x-150x145.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/xkcd-1938_meltdown_and_spectre_2x-300x289.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/xkcd-1938_meltdown_and_spectre_2x-768x740.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/xkcd-1938_meltdown_and_spectre_2x-657x633.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/xkcd-1938_meltdown_and_spectre_2x-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/xkcd-1938_meltdown_and_spectre_2x.png 1147w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><br \/>\nImage credit: <a href=\"https:\/\/www.xkcd.com\/1938\/\" target=\"_blank\" rel=\"noopener\">xkcd #1938<\/a> by Randall Munroe<\/p>\n<p>The world&#8217;s public knowledge about speculative execution vulnerabilities is only just beginning to blossom. As more brilliant minds begin exploring potential avenues for exploitation, it&#8217;s likely that more patches will be needed, so subscribe to <strong>The Mac Security Blog<\/strong>, the <strong><a href=\"http:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\">Intego Mac Podcast<\/a><\/strong>, and <strong><a href=\"https:\/\/www.youtube.com\/subscription_center?add_user=IntegoVideo\" target=\"_blank\" rel=\"noopener\">Intego&#8217;s YouTube channel<\/a><\/strong> to make sure you don&#8217;t miss any important news!<\/p>\n<h3>What are your thoughts?<\/h3>\n<p>We&#8217;d love to hear your comments!<\/p>\n<p>Why do you suppose Apple used different language about watchOS, saying that it &#8220;did not require mitigation&#8221; for Meltdown, while it &#8220;is unaffected by Spectre&#8221;?<\/p>\n<p>Are there any other potential impacts of Meltdown and Spectre about which you feel Apple product users should be aware?<\/p>\n<p>Discuss in the comments below, and be sure to share this article with your friends.<\/p>\n<p>And after you listen to the upcoming podcast, feel free to write in with questions; <strong>you could win a $25 gift certificate<\/strong> or another great prize! For details, <a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\">subscribe<\/a> and listen to the upcoming January 10 episode.<br \/>\n<span style=\"font-size: x-small;\">Intel processor image credit: <a href=\"https:\/\/www.flickr.com\/photos\/intel_de\/9662276651\" target=\"_blank\" rel=\"noopener\">Intel in Deutschland<\/a>. Meltdown and Spectre logos by <a href=\"https:\/\/vividfox.me\/\" target=\"_blank\" rel=\"noopener\">Natascha Eibl<\/a> via <a href=\"https:\/\/meltdownattack.com\/\" target=\"_blank\" rel=\"noopener\">meltdownattack.com<\/a>.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You&#8217;ve probably heard something about &#8220;Meltdown&#8221; and &#8220;Spectre,&#8221; perhaps even in the mainstream media, and you\u00a0likely\u00a0heard that it has something to do with an Intel security flaw. But do you know how it affects your Apple devices\u2014your Mac, iPhone, iPad, iPod touch, Apple Watch, or Apple TV\u2014and what actions you may need to take to [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":74059,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[151,5],"tags":[3868,3865,3862,3853,3856,4712,143],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"You&#039;ve probably heard something about &quot;Meltdown&quot; and &quot;Spectre,&quot; perhaps even in the mainstream media, and you\u00a0likely\u00a0heard that it has something to do\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Meltdown and Spectre: What Apple users need to know - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"You&#039;ve probably heard something about &quot;Meltdown&quot; and &quot;Spectre,&quot; perhaps even in the mainstream media, and you\u00a0likely\u00a0heard that it has something to do\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-08T16:23:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-27T21:03:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Meltdown-Spectre-Apple.png\" \/>\n\t<meta property=\"og:image:width\" content=\"420\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Meltdown-Spectre-Apple.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Meltdown-Spectre-Apple.png\",\"width\":420,\"height\":260,\"caption\":\"Meltdown and Spectre Apple security news\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/\",\"name\":\"Meltdown and Spectre: What Apple users need to know - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/#primaryimage\"},\"datePublished\":\"2018-01-08T16:23:45+00:00\",\"dateModified\":\"2023-10-27T21:03:24+00:00\",\"description\":\"You've probably heard something about \\\"Meltdown\\\" and \\\"Spectre,\\\" perhaps even in the mainstream media, and you\\u00a0likely\\u00a0heard that it has something to do\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Meltdown and Spectre: What Apple users need to know\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Meltdown and Spectre: What Apple users need to know\",\"datePublished\":\"2018-01-08T16:23:45+00:00\",\"dateModified\":\"2023-10-27T21:03:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/#webpage\"},\"wordCount\":2162,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Meltdown-Spectre-Apple.png\",\"keywords\":[\"CVE-2017-5715\",\"CVE-2017-5753\",\"CVE-2017-5754\",\"Meltdown\",\"Spectre\",\"Speculative Execution\",\"Vulnerabilities\"],\"articleSection\":[\"Recommended\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"You've probably heard something about \"Meltdown\" and \"Spectre,\" perhaps even in the mainstream media, and you\u00a0likely\u00a0heard that it has something to do","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/","og_locale":"en_US","og_type":"article","og_title":"Meltdown and Spectre: What Apple users need to know - The Mac Security Blog","og_description":"You've probably heard something about \"Meltdown\" and \"Spectre,\" perhaps even in the mainstream media, and you\u00a0likely\u00a0heard that it has something to do","og_url":"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2018-01-08T16:23:45+00:00","article_modified_time":"2023-10-27T21:03:24+00:00","og_image":[{"width":420,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Meltdown-Spectre-Apple.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Meltdown-Spectre-Apple.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Meltdown-Spectre-Apple.png","width":420,"height":260,"caption":"Meltdown and Spectre Apple security news"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/","name":"Meltdown and Spectre: What Apple users need to know - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/#primaryimage"},"datePublished":"2018-01-08T16:23:45+00:00","dateModified":"2023-10-27T21:03:24+00:00","description":"You've probably heard something about \"Meltdown\" and \"Spectre,\" perhaps even in the mainstream media, and you\u00a0likely\u00a0heard that it has something to do","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Meltdown and Spectre: What Apple users need to know"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Meltdown and Spectre: What Apple users need to know","datePublished":"2018-01-08T16:23:45+00:00","dateModified":"2023-10-27T21:03:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/#webpage"},"wordCount":2162,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Meltdown-Spectre-Apple.png","keywords":["CVE-2017-5715","CVE-2017-5753","CVE-2017-5754","Meltdown","Spectre","Speculative Execution","Vulnerabilities"],"articleSection":["Recommended","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Meltdown-Spectre-Apple.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-jfD","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/74005"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=74005"}],"version-history":[{"count":10,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/74005\/revisions"}],"predecessor-version":[{"id":88249,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/74005\/revisions\/88249"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/74059"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=74005"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=74005"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=74005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}