tedjames wrote: » Wait, there's more!https://twitter.com/misc0110/status/948706387491786752
tedjames wrote: » SANS conducted a webinar about it today. If you have a SANS account, you can view the slides and presentation.
636-555-3226 wrote: » Not sure what all the hype is about. Yeah if you're a cloud virtualization provider, but for most individuals & businesses it's not a big deal. Meltdown is only privilege escalation, not remote code execution. Individuals who don't download and run random crap all day should be fine. Most businesses I know give users admin anyway, so that's not going to matter. Even for users who are users, just make sure they don't download and run random crap. Spectre is a bit more interesting, but I at least haven't seen any exploits out there yet, and even then applicability depends on the exploit. Maybe if you're hacking someone's sandboxed browser, but you'll need to get them to browse to your malicious website. Maybe malvertisements, but even then there's a few layers of defenses. IMO, yeah, patch, but 99% of people don't need to go crazy about it. news orgs are just looking for headlines & clickbait