<?xml version="1.0" encoding="UTF-8"?><feed
	xmlns="http://www.w3.org/2005/Atom"
	xmlns:thr="http://purl.org/syndication/thread/1.0"
	xml:lang="en-US"
	>
	<title type="text">Meltdown: the latest news on two major CPU security bugs &#8211; The Verge</title>
	<subtitle type="text">The Verge is about technology and how it makes us feel. Founded in 2011, we offer our audience everything from breaking news to reviews to award-winning features and investigations, on our site, in video, and in podcasts.</subtitle>

	<updated>2018-05-21T21:28:04+00:00</updated>

	<link rel="alternate" type="text/html" href="https://www.theverge.com/2018/1/4/16850516/intel-meltdown-spectre-bug-patch-cpu-security-flaw-news" />
	<id>https://www.theverge.com/rss/stream/16614557</id>
	<link rel="self" type="application/atom+xml" href="https://www.theverge.com/rss/stream/16614557" />

	<icon>https://platform.theverge.com/wp-content/uploads/sites/2/2025/01/verge-rss-large_80b47e.png?w=150&amp;h=150&amp;crop=1</icon>
		<entry>
			
			<author>
				<name>Tom Warren</name>
			</author>
			
			<title type="html"><![CDATA[Google and Microsoft disclose new CPU flaw, and the fix can slow machines down]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2018/5/21/17377994/google-microsoft-cpu-vulnerability-speculative-store-bypass-variant-4" />
			<id>https://www.theverge.com/2018/5/21/17377994/google-microsoft-cpu-vulnerability-speculative-store-bypass-variant-4</id>
			<updated>2018-05-21T17:28:04-04:00</updated>
			<published>2018-05-21T17:28:04-04:00</published>
			<category scheme="https://www.theverge.com" term="Google" /><category scheme="https://www.theverge.com" term="Intel" /><category scheme="https://www.theverge.com" term="Microsoft" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Microsoft and Google are jointly disclosing a new CPU security vulnerability that's similar to the Meltdown and Spectre flaws that were revealed earlier this year. Labelled Speculative Store Bypass (variant 4), the latest vulnerability is a similar exploit to Spectre and exploits speculative execution that modern CPUs use. Browsers like Safari, Edge, and Chrome were [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Illustration by Alex Castro / The Verge" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/10082341/acastro_180109_1777_0001_v1.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Microsoft and Google are jointly disclosing a new CPU security vulnerability that's similar to the Meltdown and Spectre flaws that were revealed earlier this year. Labelled <a href="https://www.us-cert.gov/ncas/alerts/TA18-141A">Speculative Store Bypass</a> (variant 4), the latest vulnerability is a similar exploit to Spectre and exploits speculative execution that modern CPUs use. Browsers like Safari, Edge, and Chrome were all patched for Meltdown earlier this year, and Intel says "these mitigations are also applicable to variant 4 and available for consumers to use today."</p>
<p>However, unlike Meltdown (and more similar to Spectre) this new vulnerability will also include firmware updates for CPUs tha …</p>
<p><a href="https://www.theverge.com/2018/5/21/17377994/google-microsoft-cpu-vulnerability-speculative-store-bypass-variant-4">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Ashley Carman</name>
			</author>
			
			<title type="html"><![CDATA[Intel says it won’t patch older chips for Spectre]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2018/4/4/17198322/intel-spectre-patch-update-fix" />
			<id>https://www.theverge.com/2018/4/4/17198322/intel-spectre-patch-update-fix</id>
			<updated>2018-04-04T12:45:47-04:00</updated>
			<published>2018-04-04T12:45:47-04:00</published>
			<category scheme="https://www.theverge.com" term="Intel" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Intel updated its patching guidance for Spectre this week, continuing the months-long process of fixing the critical security flaw. Although the company had previously said it planned to patch all affected chips, today it clarified that some product lines won't receive updates. Most are older and, presumably, not as widely used. They include: the Bloomfield [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/assets/759380/intel-logo-verge.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Intel updated its <a href="https://newsroom.intel.com/wp-content/uploads/sites/11/2018/04/microcode-update-guidance.pdf">patching guidance</a> for Spectre this week, continuing the months-long process of fixing the critical security flaw. Although the company had previously said it planned to patch all affected chips, today it clarified that some product lines won't receive updates. Most are older and, presumably, not as widely used. They include: the Bloomfield line, Clarksfield, Gulftown, Harpertown, Jasper Forest, Penryn, SoFIA 3GR, the Wolfdale line, and the Yorkfield line.</p>
<p>Intel says it's stopped production of these fixes for three reasons, in its words:</p>
<blockquote class="wp-block-quote has-text-align-none is-layout-flow wp-block-quote-is-layout-flow">
<p>-Micro-architectural characteristics that preclude a practical implementation of featu …</p></blockquote>
<p><a href="https://www.theverge.com/2018/4/4/17198322/intel-spectre-patch-update-fix">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Tom Warren</name>
			</author>
			
			<title type="html"><![CDATA[Microsoft offers $250,000 bounty to prevent the next Meltdown and Spectre CPU flaws]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2018/3/15/17124362/microsoft-spectre-bug-bounty-speculative-execution" />
			<id>https://www.theverge.com/2018/3/15/17124362/microsoft-spectre-bug-bounty-speculative-execution</id>
			<updated>2018-03-15T11:28:59-04:00</updated>
			<published>2018-03-15T11:28:59-04:00</published>
			<category scheme="https://www.theverge.com" term="Intel" /><category scheme="https://www.theverge.com" term="Microsoft" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Microsoft is introducing a new bug bounty reward for the "speculative execution" CPU vulnerabilities that were disclosed recently. The software giant is offering up to $250,000 for bugs that are similar to the Meltdown and Spectre CPU flaws. Microsoft's bounty will run until the end of the year, and it's clearly designed to discover additional [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Photo by Vlad Savov / The Verge" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/10082485/vsavov_180123_2242_0002.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Microsoft is introducing a new bug bounty reward for the "speculative execution" CPU vulnerabilities that were disclosed recently. The software giant is offering up to $250,000 for bugs that are similar to the <a href="https://www.theverge.com/2018/1/4/16850516/intel-meltdown-spectre-bug-patch-cpu-security-flaw-news">Meltdown and Spectre CPU flaws</a>. Microsoft's bounty will run until the end of the year, and it's clearly designed to discover additional flaws as researchers begin to look at these types of vulnerabilities in processor designs.</p>
<p>"Speculative execution is truly a new class of vulnerabilities," <a href="https://blogs.technet.microsoft.com/msrc/2018/03/14/speculative-execution-bounty-launch/">says Phillip Misner</a>, a security group manager at Microsoft. "We expect that research is already underway exploring new attack methods." Microsoft  …</p>
<p><a href="https://www.theverge.com/2018/3/15/17124362/microsoft-spectre-bug-bounty-speculative-execution">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Tom Warren</name>
			</author>
			
			<title type="html"><![CDATA[Intel processors are being redesigned to protect against Spectre]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2018/3/15/17123610/intel-new-processors-protection-spectre-vulnerability" />
			<id>https://www.theverge.com/2018/3/15/17123610/intel-new-processors-protection-spectre-vulnerability</id>
			<updated>2018-03-15T10:17:15-04:00</updated>
			<published>2018-03-15T10:17:15-04:00</published>
			<category scheme="https://www.theverge.com" term="Intel" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Intel is revealing today that the company is introducing hardware protections against the Spectre CPU flaw that was discovered last year. While the Meltdown vulnerability will continue to be addressed through software updates, Intel CEO Brian Krzanich says the company has "redesigned parts of the processor to introduce new levels of protection through partitioning" that [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Illustration by Alex Castro / The Verge" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/10082341/acastro_180109_1777_0001_v1.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Intel is revealing today that the company is introducing hardware protections against the Spectre CPU flaw that was discovered last year. While the Meltdown vulnerability will continue to be addressed through software updates,<a href="https://newsroom.intel.com/editorials/advancing-security-silicon-level/"> Intel CEO Brian Krzanich says</a> the company has "redesigned parts of the processor to introduce new levels of protection through partitioning" that will protect against the Spectre variants. Intel's next-generation Xeon processors (Cascade Lake) will include the new partitioning, alongside 8th generation Intel Core processors that ship in the second half of 2018.</p>
<p>The partitioning will work as an extra protective wall be …</p>
<p><a href="https://www.theverge.com/2018/3/15/17123610/intel-new-processors-protection-spectre-vulnerability">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Tom Warren</name>
			</author>
			
			<title type="html"><![CDATA[Microsoft is bringing Intel’s Spectre fixes to its Windows update catalog]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2018/3/1/17067854/microsoft-intel-spectre-firmware-updates-update-catalog" />
			<id>https://www.theverge.com/2018/3/1/17067854/microsoft-intel-spectre-firmware-updates-update-catalog</id>
			<updated>2018-03-01T13:52:30-05:00</updated>
			<published>2018-03-01T13:52:30-05:00</published>
			<category scheme="https://www.theverge.com" term="Intel" /><category scheme="https://www.theverge.com" term="Microsoft" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Microsoft is planning to distribute Intel's firmware updates to protect Windows 10 systems against the Spectre CPU vulnerability. While Microsoft typically distributes its own firmware updates for Surface devices, the software maker usually leaves it up to PC makers to issue their own firmware updates. Microsoft is now planning to list the Intel firmware updates [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Illustration by Alex Castro / The Verge" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/10082341/acastro_180109_1777_0001_v1.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Microsoft is planning to distribute Intel's firmware updates to protect Windows 10 systems against the Spectre CPU vulnerability. While Microsoft typically distributes its own firmware updates for Surface devices, the software maker usually leaves it up to PC makers to issue their own firmware updates. Microsoft is now planning to list the <a href="https://www.theverge.com/2018/2/21/17036626/intel-spectre-patch-chip-update-7th-8th-gen">Intel firmware updates</a> in its Microsoft Update Catalog, which will help IT admins distribute these to systems.</p>
<p>Updates for Skylake systems will be available initially, and Microsoft says it will list more system firmware updates as they become available. "We will continue to work with chipset and device m …</p>
<p><a href="https://www.theverge.com/2018/3/1/17067854/microsoft-intel-spectre-firmware-updates-update-catalog">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Tom Warren</name>
			</author>
			
			<title type="html"><![CDATA[Intel didn’t warn US government about CPU security flaws until they were public]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2018/2/23/17043768/intel-meltdown-spectre-no-us-goverment-warning" />
			<id>https://www.theverge.com/2018/2/23/17043768/intel-meltdown-spectre-no-us-goverment-warning</id>
			<updated>2018-02-23T05:41:36-05:00</updated>
			<published>2018-02-23T05:41:36-05:00</published>
			<category scheme="https://www.theverge.com" term="Intel" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Intel didn't provide US government officials with details on the Meltdown and Spectre CPU flaws until they leaked to the public last month. Reuters reports that US government officials have raised concerns that the flaws weren't disclosed privately as they could have impacted national security. Intel didn't report the flaws to US authorities because hackers [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Illustration by Alex Castro / The Verge" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/10082357/acastro_180109_1777_0001_v2.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Intel didn't provide US government officials with details on the Meltdown and Spectre CPU flaws until they leaked to the public last month. <a href="https://www.reuters.com/article/us-cyber-intel/intel-did-not-tell-u-s-cyber-officials-about-chip-flaws-until-made-public-idUSKCN1G62PS"><em>Reuters</em> reports</a> that US government officials have raised concerns that the flaws weren't disclosed privately as they could have impacted national security. Intel didn't report the flaws to US authorities because hackers hadn't exploited the vulnerabilities yet. <a href="https://www.wsj.com/articles/intel-warned-chinese-companies-of-chip-flaws-before-u-s-government-1517157430"><em>The Wall Street Journal</em> previously reported</a> that Intel notified a small number of customers about the flaws, including Chinese companies like Lenovo and Alibaba, before they were revealed publicly.</p>
<p>The approach may explain some of the confusion a …</p>
<p><a href="https://www.theverge.com/2018/2/23/17043768/intel-meltdown-spectre-no-us-goverment-warning">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Ashley Carman</name>
			</author>
			
			<title type="html"><![CDATA[Intel rolls out Spectre updates for 7th and 8th-gen Core chips]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2018/2/21/17036626/intel-spectre-patch-chip-update-7th-8th-gen" />
			<id>https://www.theverge.com/2018/2/21/17036626/intel-spectre-patch-chip-update-7th-8th-gen</id>
			<updated>2018-02-21T13:45:57-05:00</updated>
			<published>2018-02-21T13:45:57-05:00</published>
			<category scheme="https://www.theverge.com" term="Intel" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Intel is attempting to patch Spectre again today with the rollout of patches for Kaby Lake-, Coffee Lake-, and Skylake-based platforms. The updates will cover the company's sixth, seventh, and eighth-generation Intel Core product lines, as well as the X-series processor family. The Xeon Scalable and Intel Xeon D processors for data center systems will [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/assets/759380/intel-logo-verge.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Intel is attempting to patch Spectre again today with <a href="https://newsroom.intel.com/news/latest-intel-security-news-updated-firmware-available/">the rollout of patches</a> for Kaby Lake-, Coffee Lake-, and Skylake-based platforms. The updates will cover the company's sixth, seventh, and eighth-generation Intel Core product lines, as well as the X-series processor family. The Xeon Scalable and Intel Xeon D processors for data center systems will also be protected. The updates will be issued through OEM firmware pushes.</p>
<p>Intel previously issued a patch to address Spectre, but then had to tell users <a href="https://www.theverge.com/2018/1/22/16919426/intel-advises-pause-deployment-of-spectre-patch">to stop deploying</a> the fix because it sometimes caused computers to spontaneously reboot. At the time, executive vice president Navin Shenoy  …</p>
<p><a href="https://www.theverge.com/2018/2/21/17036626/intel-spectre-patch-chip-update-7th-8th-gen">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Tom Warren</name>
			</author>
			
			<title type="html"><![CDATA[Intel facing 32 lawsuits over Meltdown and Spectre CPU security flaws]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2018/2/16/17020048/intel-spectre-meltdown-class-action-lawsuits" />
			<id>https://www.theverge.com/2018/2/16/17020048/intel-spectre-meltdown-class-action-lawsuits</id>
			<updated>2018-02-16T10:35:20-05:00</updated>
			<published>2018-02-16T10:35:20-05:00</published>
			<category scheme="https://www.theverge.com" term="Intel" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Intel has revealed today that the company is facing at least 32 lawsuits over the Meltdown and Spectre CPU flaws. "As of February 15, 2018, 30 customer class action lawsuits and two securities class action lawsuits have been filed," says Intel in an SEC filing today. The customer class action lawsuits are "seeking monetary damages [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Illustration by Alex Castro / The Verge" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/10082341/acastro_180109_1777_0001_v1.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Intel has revealed today that the company is facing at least 32 lawsuits over the Meltdown and Spectre CPU flaws. "As of February 15, 2018, 30 customer class action lawsuits and two securities class action lawsuits have been filed," says Intel <a href="https://www.intc.com/investor-relations/financials-and-filings/sec-filings/sec-filings-details/default.aspx?FilingId=12559970">in an SEC filing today</a>. The customer class action lawsuits are "seeking monetary damages and equitable relief," while the securities lawsuits "allege that Intel and certain officers violated securities laws by making statements about Intel's products and internal controls that were revealed to be false or misleading by the disclosure of the security vulnerabilities."</p>
<p>Intel is also facing action from t …</p>
<p><a href="https://www.theverge.com/2018/2/16/17020048/intel-spectre-meltdown-class-action-lawsuits">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Tom Warren</name>
			</author>
			
			<title type="html"><![CDATA[Microsoft issues emergency Windows update to disable Intel’s buggy Spectre fixes]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2018/1/29/16944326/microsoft-spectre-processor-bug-emergency-windows-update-reboot-fix" />
			<id>https://www.theverge.com/2018/1/29/16944326/microsoft-spectre-processor-bug-emergency-windows-update-reboot-fix</id>
			<updated>2018-01-29T04:10:41-05:00</updated>
			<published>2018-01-29T04:10:41-05:00</published>
			<category scheme="https://www.theverge.com" term="Intel" /><category scheme="https://www.theverge.com" term="Microsoft" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Microsoft has been forced to issue a second out-of-band security update this month, to deal with the issues around Intel's Spectre firmware updates. Intel warned last week that its own security updates have been buggy, causing some systems to spontaneously reboot. Intel then buried a warning in its latest financial results that its buggy firmware [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Illustration by Alex Castro / The Verge" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/10082341/acastro_180109_1777_0001_v1.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Microsoft has been forced to issue a second out-of-band security update this month, to deal with the issues around Intel's Spectre firmware updates. <a href="https://www.theverge.com/2018/1/22/16919426/intel-advises-pause-deployment-of-spectre-patch">Intel warned last week</a> that its own security updates have been buggy, causing some systems to spontaneously reboot. Intel then <a href="https://www.intc.com/investor-relations/investor-education-and-news/investor-news/press-release-details/2018/Intel-Reports-Fourth-Quarter-2017-Financial-Results/default.aspx">buried a warning</a> in its latest financial results that its buggy firmware updates could lead to "data loss or corruption."</p>
<p>Intel has been advising PC makers and customers to simply stop updating their firmware right now, until properly tested updates are available. Microsoft has gone a step further, and is <a href="https://support.microsoft.com/en-us/help/4078130/update-to-disable-mitigation-against-spectre-variant-2">issuing a new software update</a> for Windows 7, Windows 8.1, and Win …</p>
<p><a href="https://www.theverge.com/2018/1/29/16944326/microsoft-spectre-processor-bug-emergency-windows-update-reboot-fix">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[New macOS patch protects older operating systems against Meltdown]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2018/1/23/16924444/meltdown-macos-patch-sierra-el-capitan-chaios" />
			<id>https://www.theverge.com/2018/1/23/16924444/meltdown-macos-patch-sierra-el-capitan-chaios</id>
			<updated>2018-01-23T14:24:49-05:00</updated>
			<published>2018-01-23T14:24:49-05:00</published>
			<category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Apple has rolled out a new security update to protect older operating systems against the Meltdown bug, the most easily exploitable of the processor vulnerabilities made public earlier this year. Patches for macOS High Sierra were released on January 8th, but the patch did not apply to older versions of the operating system. Today's update [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Illustration by Alex Castro / The Verge" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/10082357/acastro_180109_1777_0001_v2.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Apple has rolled out a <a href="https://9to5mac.com/2018/01/23/mac-security-update-fixes-meltdown-macos-sierra-el-capitan/">new security update</a> to protect older operating systems against the Meltdown bug, the most easily exploitable of the processor vulnerabilities <a href="https://support.apple.com/en-us/HT208465">made public earlier this year</a>. Patches for macOS High Sierra were released <a href="https://www.theverge.com/2018/1/8/16863884/meltdown-spectre-apple-security-update-safari-webkit">on January 8th</a>, but the patch did not apply to older versions of the operating system. Today's update brings the same protections to Sierra (version 10.12.6) and El Capitan (version 10.11.6).</p>
<p>It's the latest in a string of patches Apple has released in response to the industry-wide processor failures. The company also developed patches to Safari and WebKit to protect against a separate exploitation of the …</p>
<p><a href="https://www.theverge.com/2018/1/23/16924444/meltdown-macos-patch-sierra-el-capitan-chaios">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
	</feed>
