Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Alerts»Meltdown & Spectre – How to Protect Yourself
    Alerts

    Meltdown & Spectre – How to Protect Yourself

    By Christopher JohnsonJanuary 5, 20182 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    Following up on our previous post sharing what was then breaking information about these vulnerabilities, the UISO would like to share some additional best practices to follow in order to reduce one’s risk to attack.

    Install Operating System Updates on Personal Devices

    Staying current with security updates on personal for security features is always advised, and all major operating systems not currently end-of-life have patches in place that aid in reducing risk. The following are guides for updating one’s operating system for those not familiar with the process.

    • Windows
    • macOS
    • iOS
    • Android

    Limit JavaScript in your Web Browser

    One of the methods by which Meltdown and Spectre can be triggered is via JavaScript, which can be activated by visiting a website hosting malicious code intentionally or via a targeted advertisement. The UISO recommends adding a browser extension that limits exposure to potentially malicious JavaScript.

    For performance purposes, it is recommended to install one or the other of these extensions, but not both.

    • uBlock Origin
      • Chrome
      • Firefox
      • Safari
      • Edge
    • Adblock Plus
      • Chrome
      • Firefox
      • Safari
      • Edge

     

    Research is still underway, and as further methods to mitigate the risk posed by these vulnerabilities are assessed by the information security community we will share them accordingly.

    As always, please subscribe to this blog, our Twitter feed, or our FaceBook page for updates, and contact the UISO with any questions or concerns.

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Previous ArticleArticle:“Meltdown” and “Spectre”: Every modern processor has unfixable security flaws
    Next Article Educational Institutions Attractive Target for Cybercriminals

    Related Posts

    5 Active Malware Campaigns in Early 2025: What You Need to Know

    10 Critical Network Pentest Findings IT Teams Overlook

    Report Phishing Instantly with PhishAlarm

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d