Latest Spectre & Meltdown Exploits leaks Passwords & Sensitive Date on Android & Mac

Android Spectre & Meltdown exploit

Both Android phones and Mac may be affected by the latest 'Spectre and Meltdown exploits' that would affect the devices which are powered by Intel, AMD and ARM processors. It would also affect the mobile and acquire sensitive information from the mobile leaving the user with the fright of losing the same.

The mobile devices are vulnerable, hence, it may or may not be difficult for the exploit to affect the mobiles. The Spectre could lead to the surreptitiously and gradually, acquiring secret information from the clouds servers, customer data and things that need to be kept confidential which seems to be a risky aspect.

Apart from all these, Google has stated that it has set the boundary to safeguard the information. The January Android security patch is from Google that will protect devices running the open source OS.

There is a huge portion of the Google's products used by the Android phones. Again, in this context, however, it has been stated by Google that its products, Google Search, YouTube, Google Ads products, Maps, Blogger, and the customer data held by Google, are protected.

Again the 'Meltdown' exploit is been created in order to  Intel processors based devices. It is so bad that it would get the or rather take the information illegally from the PC.

"Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware bugs allow programs to steal data which is currently processed on the computer. While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs. This might include your passwords stored in a password manager or browser, your personal photos, emails, instant messages and even business-critical documents" Meltdownattack.com.

The company, Google on Tuesday started to roll out the said security update for compatible devices. Factory images and OTA zip files were released by Google so that the manual installation of the latest build could be possible by the users of the required devices.

The Android Security Bulletin for the month of January stated:

"The severity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed."

There has been close to 20 issues resolved by January Android security patch right from the inception of new year. Even though there were reports of the lags related to the update, the new version of OTA overcomes the same and the slow down does not pop up for the user when resorted to the same.

Source: Google