It is nothing but trading speed for security especially by Intel.The reason why Intel processors,especially since core2duo era,are on an average always faster than AMD processors is because of the sacrifices Intel made on security front to keep their processors ahead of AMD.Because of this reason Intel processors are affected by Meltdown bug but not AMD processors & also the reason why Intel processors are much more susceptible to Spectre bug than AMD processors.I'm not scared but not ignorant either. My guess like other this flaw is there for a long time and for a reason for security agencies to steal data and at-least wannacry type thing did not spread through such cpu bug.
This bug only discovered now and what else is there on the processor to steal data god only knows.
I'm still on win7 so using a browser incognito mode is all I can think off. But this new bug sure will increse the sell of 'new' hardware by a big margin especially corporate client base where there are many old computers still in use as they don't need any extra processing power or a new OS but for safe guarding data they may incline more towards cluoud solutions or newer hardware and the same goes for many of us ie getting newer hardware - so I can see this as a security breach and at the same time a business plan.
The day we see a malware exploiting this flaw and becomes publicly available... It will be devastating.It is nothing but trading speed for security especially by Intel.The reason why Intel processors,especially since core2duo era,are on an average always faster than AMD processors is because of the sacrifices Intel made on security front to keep their processors ahead of AMD.Because of this reason Intel processors are affected by Meltdown bug but not AMD processors & also the reason why Intel processors are much more susceptible to Spectre bug than AMD processors.
No new hardware(aka processor) immune against Spectre is going to be launched in the market for at least 2-3 years because it requires a complete rewriting of cpu architecture which neither Intel nor AMD can do even in a year.Also "Cloud hardware" is much more affected by these bugs because unlike consumer desktop/laptop,cloud hardware runs shared servers & now anybody can rent a cheap server to run on some of the biggest cloud service hardware providers & potentially exploit these bugs to access crucial information from other servers of companies/organizations running on same cloud hardware.That is also the reason why some cloud service become slow after application of these patches because unlike consumer systems they don't have the luxury of not installing patches & waiting for things to clear.
Right now AMD hardware is the better option to buy even after taking into account its vulnerability to Spectre.
The tools mentioned in above link are not exactly meant for typical home users & probably why microsoft actually added InSpectre tool to dangerous program in its WD database as well as smart screen filter.In any case as long as bios update is not released for your desktop mobo bios/laptop bios,there isn't even any need to check as that automatically means a system is vulnerable.
Bios update is mainly for Spectre bug,MS windows patches are for Meltdown bug.I have edited my earlier post for clarification.Exploiting Spectre bug is difficult so most likely its target will be big organizations.Spectre bug can be theoretically executed via a mere javascript running in a browser so for safety remove all saved login info related to banking/sensitive sites from all browsers/programs & open only one browser window(no other tab/browser open in system) in incognito/private mode when doing banking/sensitive transactions & close it after logging out & wait for 1-2 minutes before launching same/another browser for usual surfing.Also keep all browsers updated at all time.
Every Intel processor is affected by Meltdown as well as Spectre bug,windows patch is for meltdown bug(it is this patch that reduces performance of intel processors) & 1st variant of Spectre bug that comes through windows update.Bios update of mobo manufacturer only address 2nd variant of Spectre.There is practically no pc processor currently in the world that is not vulnerable against Spectre.That tool only shows "yes" for reason that spectre os patch & spectre bios patch is applied,removing spectre vulnerability requires a new design processor completely different from current processor designs.*i.imgur.com/q8HmfAF.png
Thanks. Won't update the lappy's bios. My pc has a Asus B350 plus mobo. How to update its bios? Have they released a stable version?Every Intel processor is affected by Meltdown as well as Spectre bug,windows patch is for meltdown bug(it is this patch that reduces performance of intel processors) & 1st variant of Spectre bug that comes through windows update.Bios update of mobo manufacturer only address 2nd variant of Spectre.There is practically no pc processor currently in the world that is not vulnerable against Spectre.That tool only shows "yes" for reason that spectre os patch & spectre bios patch is applied,removing spectre vulnerability requires a new design processor completely different from current processor designs.
@billubakra for intel laptops BIOS update from laptop manufacturer is required for Spectre v2 mitigation but don't be in a hurry because in last few days many laptop manufacturers(incl Dell & HP) had to recall bios updates after many complaints about system reboots & system instability issues.For AMD systems only Spectre patches are required & Spectre v1 patch will be provided by MS through update while Spectre v2 patch require bios update from your system mobo manufacturer.