{"id":74101,"date":"2018-01-10T09:08:14","date_gmt":"2018-01-10T17:08:14","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=74101"},"modified":"2019-05-08T20:17:42","modified_gmt":"2019-05-09T03:17:42","slug":"the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/","title":{"rendered":"Is my computer&#8217;s CPU secure? &#8211; Intego Mac Podcast, Episode 13"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-73558\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode.png\" alt=\"New Intego Mac Podcast Episode\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>The <a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\">Intego Mac Podcast<\/a> episode 13 is now available!<\/p>\n<p>This week&#8217;s episode features Kirk and Josh&#8217;s analysis of Meltdown and Spectre, two vulnerabilities that affect the majority of computers and portable devices in circulation, both of which require software and perhaps hardware fixes to mitigate potential threats. Josh highlights\u00a0an interview he conducted with a security researcher on some particularly malicious adware\/malware, called Pirrit. Our hosts\u00a0also answer some reader email and discuss\u00a0password &#8220;hashing.&#8221;<\/p>\n<p>Check out <a href=\"http:\/\/podcast.intego.com\/13\" target=\"_blank\" rel=\"noopener\">the latest episode<\/a>\u00a0today and, if you like what you hear, please rate and review the Intego Mac Podcast on iTunes!<\/p>\n<p><strong>Have a question? Ask us! <\/strong><\/p>\n<p>A new episode is available weekly, every Wednesday. Want your question aired in our next episode of the Intego Mac Podcast? Listeners and fans of the podcast can <a href=\"http:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"noopener\">contact Intego<\/a> via email at\u00a0podcast@intego.com and ask us any question that your burning heart desires, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Intego Mac Podcast episode 13 is now available! This week&#8217;s episode features Kirk and Josh&#8217;s analysis of Meltdown and Spectre, two vulnerabilities that affect the majority of computers and portable devices in circulation, both of which require software and perhaps hardware fixes to mitigate potential threats. Josh highlights\u00a0an interview he conducted with a security [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":73561,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390,5],"tags":[3715],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The Intego Mac Podcast episode 13 is now available! This week&#039;s episode features Kirk and Josh&#039;s analysis of Meltdown and Spectre, two vulnerabilities\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is my computer&#039;s CPU secure? - Intego Mac Podcast, Episode 13 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The Intego Mac Podcast episode 13 is now available! This week&#039;s episode features Kirk and Josh&#039;s analysis of Meltdown and Spectre, two vulnerabilities\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-10T17:08:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-09T03:17:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/\",\"name\":\"Is my computer's CPU secure? - Intego Mac Podcast, Episode 13 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/#primaryimage\"},\"datePublished\":\"2018-01-10T17:08:14+00:00\",\"dateModified\":\"2019-05-09T03:17:42+00:00\",\"description\":\"The Intego Mac Podcast episode 13 is now available! This week's episode features Kirk and Josh's analysis of Meltdown and Spectre, two vulnerabilities\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is my computer&#8217;s CPU secure? &#8211; Intego Mac Podcast, Episode 13\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Is my computer&#8217;s CPU secure? &#8211; Intego Mac Podcast, Episode 13\",\"datePublished\":\"2018-01-10T17:08:14+00:00\",\"dateModified\":\"2019-05-09T03:17:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/#webpage\"},\"wordCount\":169,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png\",\"keywords\":[\"Intego Mac Podcast\"],\"articleSection\":[\"Intego Mac Security Podcast\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The Intego Mac Podcast episode 13 is now available! This week's episode features Kirk and Josh's analysis of Meltdown and Spectre, two vulnerabilities","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/","og_locale":"en_US","og_type":"article","og_title":"Is my computer's CPU secure? - Intego Mac Podcast, Episode 13 - The Mac Security Blog","og_description":"The Intego Mac Podcast episode 13 is now available! This week's episode features Kirk and Josh's analysis of Meltdown and Spectre, two vulnerabilities","og_url":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/","og_site_name":"The Mac Security Blog","article_published_time":"2018-01-10T17:08:14+00:00","article_modified_time":"2019-05-09T03:17:42+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/","name":"Is my computer's CPU secure? - Intego Mac Podcast, Episode 13 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/#primaryimage"},"datePublished":"2018-01-10T17:08:14+00:00","dateModified":"2019-05-09T03:17:42+00:00","description":"The Intego Mac Podcast episode 13 is now available! This week's episode features Kirk and Josh's analysis of Meltdown and Spectre, two vulnerabilities","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Is my computer&#8217;s CPU secure? &#8211; Intego Mac Podcast, Episode 13"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Is my computer&#8217;s CPU secure? &#8211; Intego Mac Podcast, Episode 13","datePublished":"2018-01-10T17:08:14+00:00","dateModified":"2019-05-09T03:17:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/#webpage"},"wordCount":169,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png","keywords":["Intego Mac Podcast"],"articleSection":["Intego Mac Security Podcast","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-13-is-my-computers-cpu-secure\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-jhb","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/74101"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=74101"}],"version-history":[{"count":12,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/74101\/revisions"}],"predecessor-version":[{"id":87370,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/74101\/revisions\/87370"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/73561"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=74101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=74101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=74101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}