{"id":234,"date":"2019-03-20T13:40:51","date_gmt":"2019-03-20T11:40:51","guid":{"rendered":"https:\/\/www.mozdomains.com\/blog\/en\/?p=234"},"modified":"2020-05-31T01:38:11","modified_gmt":"2020-05-30T23:38:11","slug":"tips-to-protect-your-devices-from-spectre-meltdown","status":"publish","type":"post","link":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-devices-from-spectre-meltdown\/","title":{"rendered":"Tips To Protect Your Devices From Spectre Meltdown"},"content":{"rendered":"<p style=\"text-align: justify;\">The Meltdown and Spectre processor vulnerabilities have affected nearly every modern processor from Intel, AMD, and ARM. Discovered by the\u00a0<strong>Google Project Zero team<\/strong>, the vulnerabilities allow Reading privileged memory with a side-channel. It means it can read personal data, passwords and other critical data from arbitrary kernel-memory locations. The hardware bugs would allow a malicious program to read the memory of other running programs \u2013 even in browsers, and password managers. The bugs can affect the device security of desktops, laptops, smartphones and cloud servers.<\/p>\n<p style=\"text-align: justify;\"><strong>The Meltdown Security Flaw<\/strong><\/p>\n<p style=\"text-align: justify;\">Meltdown exploits &#8220;side effects of out-of-order execution&#8221; on modern processors. It reads arbitrary kernel-memory locations such as personal data and passwords. However, the out-of-order execution is an essential feature needed in modern processors. The attack is OS independent, and also does not depend on any software vulnerabilities. Even without any permissions or privileges,\u00a0<strong>Meltdown<\/strong>\u00a0allows an attacker to read the memory of other processes or virtual machines in the cloud. Hence, this flaw virtually affects device security of every computer user.<\/p>\n<p style=\"text-align: justify;\"><strong>The Spectre Security Flaw<\/strong><\/p>\n<p style=\"text-align: justify;\">Exploiting this flaw, attackers can induce a victim to perform operations that would not occur during correct program execution. This would then leak confidential information of the victim.<\/p>\n<p style=\"text-align: justify;\"><strong>Flaw Discovery<\/strong><\/p>\n<p style=\"text-align: justify;\">The Project Zero team reports: &#8220;<strong>We have discovered that CPU data cache timing can be abused to efficiently leak information out of mis-speculated execution, leading to (at worst) arbitrary virtual memory read vulnerabilities across local security boundaries in various contexts.<br \/>\nVariants of this issue are known to affect many modern processors, including certain processors by Intel, AMD and ARM. For a few Intel and AMD CPU models, we have exploits that work against real software<\/strong>.&#8221;<\/p>\n<p style=\"text-align: justify;\">I<strong>ntel Issues Updates<\/strong><\/p>\n<p style=\"text-align: justify;\">On 1st June 2017, the Google Project Zero team had alerted this vulnerability issue to Intel, AMD and ARM. Since then, Intel and its partners have issued and deployed updates in the form of firmware updates and software patches to ensure device security. Intel reports that it has issued updates to over 90% of its processor products that it had released over the past 5 years.<\/p>\n<p style=\"text-align: justify;\"><strong>OS Vendors, Device Manufacturers Release Updates<\/strong><\/p>\n<p style=\"text-align: justify;\">Additionally, operating system vendors such as Microsoft and Apple, device manufacturers, public cloud service providers, and others have released device security updates for their products and services.<\/p>\n<p style=\"text-align: justify;\"><strong>Microsoft<\/strong><\/p>\n<p style=\"text-align: justify;\">Microsoft has rolled out security patches, however, the updates were not compatible with some antivirus solutions \u2013 it even led to the Blue Screen of Death (<strong>BSOD<\/strong>). Microsoft has requested\u00a0antivirus\u00a0vendors to update their software to make it compatible with the security updates.<\/p>\n<p style=\"text-align: justify;\"><strong>Apple<\/strong><\/p>\n<p style=\"text-align: justify;\">Apple has revealed that all iOS and Mac systems are vulnerable to Meltdown and Spectre, and it has released iOS 11.2, macOS 10.13.2, and tvOS 11.2 that provide protection against these vulnerabilities.<\/p>\n<p style=\"text-align: justify;\"><strong>How to protect from Meltdown And Spectre<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>1.Updates<\/strong><\/p>\n<p style=\"text-align: justify;\">Computer users worldwide must immediately update their operating systems and other computer (device) software. Even if automatic updates has been set up, immediately perform a manual update, and ensure that your systems are up-to-date. Do check if any other updates are available.<\/p>\n<ul style=\"text-align: justify;\">\n<li>Ensure updates for your:<\/li>\n<li>operating system<\/li>\n<li>software applications<\/li>\n<li>firmware<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><strong>2. Browser Update<\/strong><\/p>\n<p style=\"text-align: justify;\">Browsers such as Google Chrome and Mozilla Firefox have released updates, hence manually ensure that your browser is updated<\/p>\n<ul style=\"text-align: justify;\">\n<li>Ensure automatic updates for your browsers<\/li>\n<li>Manually update your browsers<\/li>\n<li>Manually check for available updates<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><strong>3.Google Chrome Site Isolation feature<\/strong><\/p>\n<p style=\"text-align: justify;\">This month (<strong>January 2018<\/strong>), Google Chrome is expected to release version 64 with additional security features to tackle vulnerability issues such Meltdown, Spectre and others. In version 63, Chrome has a Site Isolation feature that ensures that each website uses a separate instance of Chrome. This is to prevent a malicious site from infecting or accessing data from other websites. The &#8220;Site Isolation&#8221; feature is presently an experimental feature being tried out by Chrome.<\/p>\n<p style=\"text-align: justify;\"><strong>4.Countermeasure KAISER<\/strong><\/p>\n<p style=\"text-align: justify;\">In operating systems, in order to prevent side-channel attacks targeting KASLR, a countermeasure named KAISER had been developed. The Google Project Zero team found that KAISER inadvertently protects against Meltdown, and hence recommends immediate deployment of KAISER on all operating systems. The patches rolled out by Windows, Linux, and OS X are expected to have this countermeasure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Meltdown and Spectre processor vulnerabilities have affected nearly every modern processor from Intel, AMD, and ARM. Discovered by the\u00a0Google Project Zero team, the vulnerabilities allow Reading privileged memory with a side-channel. It means it can read personal data, passwords and other critical data from arbitrary kernel-memory locations. The hardware bugs would allow a malicious program to read the memory of other running programs \u2013 even in browsers, and password managers. The bugs can affect the device security of desktops, laptops, smartphones and cloud servers. The Meltdown Security Flaw Meltdown exploits &#8220;side effects of out-of-order execution&#8221; on modern processors. It\u2026<\/p>\n","protected":false},"author":3,"featured_media":235,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-234","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-website-security"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":5}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tips To Protect Your Devices From Spectre Meltdown - MozDomains Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-devices-from-spectre-meltdown\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tips To Protect Your Devices From Spectre Meltdown - MozDomains Blog\" \/>\n<meta property=\"og:description\" content=\"The Meltdown and Spectre processor vulnerabilities have affected nearly every modern processor from Intel, AMD, and ARM. Discovered by the\u00a0Google Project Zero team, the vulnerabilities allow Reading privileged memory with a side-channel. It means it can read personal data, passwords and other critical data from arbitrary kernel-memory locations. The hardware bugs would allow a malicious program to read the memory of other running programs \u2013 even in browsers, and password managers. The bugs can affect the device security of desktops, laptops, smartphones and cloud servers. The Meltdown Security Flaw Meltdown exploits &#8220;side effects of out-of-order execution&#8221; on modern processors. It\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-devices-from-spectre-meltdown\/\" \/>\n<meta property=\"og:site_name\" content=\"MozDomains Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-20T11:40:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-30T23:38:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/MMM.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"625\" \/>\n\t<meta property=\"og:image:height\" content=\"417\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Momed Jussub\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Momed Jussub\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-devices-from-spectre-meltdown\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-devices-from-spectre-meltdown\\\/\"},\"author\":{\"name\":\"Momed Jussub\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\"},\"headline\":\"Tips To Protect Your Devices From Spectre Meltdown\",\"datePublished\":\"2019-03-20T11:40:51+00:00\",\"dateModified\":\"2020-05-30T23:38:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-devices-from-spectre-meltdown\\\/\"},\"wordCount\":690,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-devices-from-spectre-meltdown\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/MMM.jpg\",\"articleSection\":[\"Website Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-devices-from-spectre-meltdown\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-devices-from-spectre-meltdown\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-devices-from-spectre-meltdown\\\/\",\"name\":\"Tips To Protect Your Devices From Spectre Meltdown - MozDomains Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-devices-from-spectre-meltdown\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-devices-from-spectre-meltdown\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/MMM.jpg\",\"datePublished\":\"2019-03-20T11:40:51+00:00\",\"dateModified\":\"2020-05-30T23:38:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-devices-from-spectre-meltdown\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-devices-from-spectre-meltdown\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-devices-from-spectre-meltdown\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/MMM.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/MMM.jpg\",\"width\":625,\"height\":417},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-devices-from-spectre-meltdown\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tips To Protect Your Devices From Spectre Meltdown\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\",\"name\":\"MozDomains Blog\",\"description\":\"Tutorials and Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\",\"name\":\"MozDomains Blog\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"caption\":\"MozDomains Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\",\"name\":\"Momed Jussub\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"caption\":\"Momed Jussub\"},\"description\":\"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \\\/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.\",\"sameAs\":[\"https:\\\/\\\/www.mozdomains.co.mz\",\"http:\\\/\\\/instagram.com\\\/momedjussub\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/momedjussub\"],\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/author\\\/momed-jussub\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tips To Protect Your Devices From Spectre Meltdown - MozDomains Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-devices-from-spectre-meltdown\/","og_locale":"en_US","og_type":"article","og_title":"Tips To Protect Your Devices From Spectre Meltdown - MozDomains Blog","og_description":"The Meltdown and Spectre processor vulnerabilities have affected nearly every modern processor from Intel, AMD, and ARM. Discovered by the\u00a0Google Project Zero team, the vulnerabilities allow Reading privileged memory with a side-channel. It means it can read personal data, passwords and other critical data from arbitrary kernel-memory locations. The hardware bugs would allow a malicious program to read the memory of other running programs \u2013 even in browsers, and password managers. The bugs can affect the device security of desktops, laptops, smartphones and cloud servers. The Meltdown Security Flaw Meltdown exploits &#8220;side effects of out-of-order execution&#8221; on modern processors. It\u2026","og_url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-devices-from-spectre-meltdown\/","og_site_name":"MozDomains Blog","article_published_time":"2019-03-20T11:40:51+00:00","article_modified_time":"2020-05-30T23:38:11+00:00","og_image":[{"width":625,"height":417,"url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/MMM.jpg","type":"image\/jpeg"}],"author":"Momed Jussub","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Momed Jussub","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-devices-from-spectre-meltdown\/#article","isPartOf":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-devices-from-spectre-meltdown\/"},"author":{"name":"Momed Jussub","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6"},"headline":"Tips To Protect Your Devices From Spectre Meltdown","datePublished":"2019-03-20T11:40:51+00:00","dateModified":"2020-05-30T23:38:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-devices-from-spectre-meltdown\/"},"wordCount":690,"commentCount":0,"publisher":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-devices-from-spectre-meltdown\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/MMM.jpg","articleSection":["Website Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-devices-from-spectre-meltdown\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-devices-from-spectre-meltdown\/","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-devices-from-spectre-meltdown\/","name":"Tips To Protect Your Devices From Spectre Meltdown - MozDomains Blog","isPartOf":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-devices-from-spectre-meltdown\/#primaryimage"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-devices-from-spectre-meltdown\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/MMM.jpg","datePublished":"2019-03-20T11:40:51+00:00","dateModified":"2020-05-30T23:38:11+00:00","breadcrumb":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-devices-from-spectre-meltdown\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-devices-from-spectre-meltdown\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-devices-from-spectre-meltdown\/#primaryimage","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/MMM.jpg","contentUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/MMM.jpg","width":625,"height":417},{"@type":"BreadcrumbList","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-devices-from-spectre-meltdown\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mozdomains.co.mz\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"Tips To Protect Your Devices From Spectre Meltdown"}]},{"@type":"WebSite","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#website","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/","name":"MozDomains Blog","description":"Tutorials and Tips","publisher":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mozdomains.co.mz\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization","name":"MozDomains Blog","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","contentUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","caption":"MozDomains Blog"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6","name":"Momed Jussub","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","caption":"Momed Jussub"},"description":"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.","sameAs":["https:\/\/www.mozdomains.co.mz","http:\/\/instagram.com\/momedjussub","https:\/\/www.linkedin.com\/in\/momedjussub"],"url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/author\/momed-jussub\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts\/234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/comments?post=234"}],"version-history":[{"count":0,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts\/234\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/media\/235"}],"wp:attachment":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/media?parent=234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/categories?post=234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/tags?post=234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}