New speculative-execution vulnerability strikes AMD, ARM, and Intel – Ars Technica

Ars Technica
A new attack that uses processors’ speculative-execution capabilities to leak data, named Speculative Store Bypass (SSB), has been published after being independently discovered by Microsoft’s Security Response Center and Google Project Zero.
What you need to know about Speculative Store Bypass, the Spectre-like ‘Variant 4’ CPU flawPCWorld
New Spectre variant 4: Our patches cause up to 8% performance hit, warns IntelZDNet
Google and Microsoft disclose new CPU flaw, and the fix can slow machines downThe Verge
CNET -Forbes -PCMag -Mac Rumors
all 94 news articles …read more